Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 07:01

General

  • Target

    CeleryInstaller.exe

  • Size

    822KB

  • MD5

    0bd82e264be214414d6dd26bac3e1770

  • SHA1

    5325e64053dcf599a9c5cedec532418716f9d357

  • SHA256

    60593ced1e78fd4b3fdffcd58bcde989d8e9b031b3ad9132815fdf614e0449d4

  • SHA512

    842a80fed2286d06987cd2dde7ae94fc6c7986eb49cc62684f62f148973e5080df7866e1d2f81d53cb5ac95ef9d88489f6765265e29104be0ae349c6a3164592

  • SSDEEP

    12288:c5SsIg0ZvkY29slOLJFbJZXM1Eg/2QAu4NRFNxIg0Z:Ru0ZvkY29+OLfzI2Q0NH10Z

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 22 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CeleryInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\CeleryInstaller.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\Celery\Celery.exe
      "C:\Users\Admin\AppData\Local\Temp\Celery\Celery.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\Celery\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\Celery\CefSharp.BrowserSubprocess.exe" --type=gpu-process --no-sandbox --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Celery\cache" --cefsharpexitsub --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\Admin\AppData\Local\Temp\Celery\debug.log" --field-trial-handle=2012,i,13607747684492989880,11537534610199398831,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --mojo-platform-channel-handle=2004 /prefetch:2 --host-process-id=4440
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3260
      • C:\Users\Admin\AppData\Local\Temp\Celery\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\Celery\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Celery\cache" --cefsharpexitsub --log-file="C:\Users\Admin\AppData\Local\Temp\Celery\debug.log" --field-trial-handle=2468,i,13607747684492989880,11537534610199398831,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --mojo-platform-channel-handle=1860 /prefetch:3 --host-process-id=4440
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1320
      • C:\Users\Admin\AppData\Local\Temp\Celery\bin\lsp\main.exe
        "C:\Users\Admin\AppData\Local\Temp\Celery\bin\lsp\main.exe"
        3⤵
        • Executes dropped EXE
        PID:2004
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc58edcc40,0x7ffc58edcc4c,0x7ffc58edcc58
      2⤵
        PID:1940
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,15263442013440602251,5751966948408239555,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1800 /prefetch:2
        2⤵
          PID:3404
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2016,i,15263442013440602251,5751966948408239555,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2076 /prefetch:3
          2⤵
            PID:2756
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,15263442013440602251,5751966948408239555,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2448 /prefetch:8
            2⤵
              PID:1388
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,15263442013440602251,5751966948408239555,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3160 /prefetch:1
              2⤵
                PID:1268
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,15263442013440602251,5751966948408239555,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3412 /prefetch:1
                2⤵
                  PID:1084
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,15263442013440602251,5751966948408239555,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3704 /prefetch:1
                  2⤵
                    PID:4404
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4776,i,15263442013440602251,5751966948408239555,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4888 /prefetch:8
                    2⤵
                      PID:1728
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,15263442013440602251,5751966948408239555,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4948 /prefetch:8
                      2⤵
                        PID:2868
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5008,i,15263442013440602251,5751966948408239555,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4760 /prefetch:1
                        2⤵
                          PID:4292
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                        1⤵
                          PID:2592
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:2044

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  2KB

                                  MD5

                                  7af7b30b6746e62a06d2d593a975c16c

                                  SHA1

                                  38750e46c4a6571189e308e92528f8deea058334

                                  SHA256

                                  8a375099cdbd2249e0142deba4a0efa0afb6f1136368aa89177fd957443be144

                                  SHA512

                                  2284fedfefd4106685cd780e1502f2bd863fded5b90af16ffc21ea1d5a7520fdcc402d3dde214bfd758674ff68460f99effe7677e12c0a3ad0bee88244e071b5

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  354B

                                  MD5

                                  b257d41e8b77440d1d60f8098307074b

                                  SHA1

                                  b88406724412945a9ad1933ae7d97b75e03ec3a0

                                  SHA256

                                  ab75b643347a72ea84c8ce3237455e5c78aa110943af71e16b515559c86f5d2c

                                  SHA512

                                  74a910987ecd2b27b18bf533ec5f16498f75f5009b8eea00616b086af0c499454edaade71d1f18697ab9a5c1720752e5c42c5b347fceb90a2cb47ae2c1a948d3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  1KB

                                  MD5

                                  736a26c265dea8eaff2c4774b288510b

                                  SHA1

                                  d580d64abde1511b6271f621e3d10d136dd931c5

                                  SHA256

                                  9f8647c85ff619653a372a15232cdb8feb24c23d8934760cb2ee44fd596f4ddc

                                  SHA512

                                  b5a61effddce358b0614bf48eaa265d2c0a9c81469d26e394550cdcaecaca4c7ed2e4b569eeef333635e29b71017f4bfd1c2c73a47eb15d1abffa1ac0a515cb2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  1KB

                                  MD5

                                  16ac1dc7bc1ad0f7cc04bf2b8502ee72

                                  SHA1

                                  d619be38f3d7db8d22f12a211fe0c41f0f05924c

                                  SHA256

                                  aa895ea1dcbe9ae9682872a0cc8a362a2c469f24969d86ba1a5c649b45c9370a

                                  SHA512

                                  dae4e4cfa6f96a223ee68873f197b9cdbfcd4979215368b704bd7c4c41da2091d88159eb1ed0645a9f9981165ae3cf20cd81b853920792e05aac5a5871115a37

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  a716f2d01ab78aa318ed2543dc6999e5

                                  SHA1

                                  56b7a2d176aef7873774bbeb8af0c6a14b1a0854

                                  SHA256

                                  e5131ad4490303c988af145054f495af848b963bafe927d0c378324fd313ab6a

                                  SHA512

                                  5c4542323d16b242f675ee9e2ad81e40e489e12db66331e731768430c5a490b2b20e1c397d9820384d55a98971fa2186a3bb4dd02dc9624e0d28fa8867b4962b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  3f3b601bbe99d0081a4a62e3a4bf4e8c

                                  SHA1

                                  8426e7722e9c55ae64f9f9d0f33077db48ffc4f6

                                  SHA256

                                  c23eebcf47d3fba4d8d7e21070268a93607593130ad67a3b294197344eab7719

                                  SHA512

                                  c10db4c5c2261377584acddf8c4d317ba40c16cfb043afd529ce5c32d49760d732f5df8180089310f0e1e80d40226c9bdbc3bf93af0a0757d67f6754695e0b3c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                  Filesize

                                  15KB

                                  MD5

                                  f5b75fc190dddc6a3abea6f53b00b449

                                  SHA1

                                  ac700ab2f9fb1fa0d1232fdd7e9806ec21557022

                                  SHA256

                                  0a054940585cf084ec52cbd7c8c2ceee507535b3ca0b8c435bd8cd70d8a019bc

                                  SHA512

                                  1ba6ba53bb09bdfd2f86fc447459a676f807679de9549b178fa4fcae73b16ffe45b9994c1ad655f8cfee5775f2a6872634e7ecc1b068418b7776e7a09a1eedf3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  183KB

                                  MD5

                                  268519835c0068157c8645140ae8e87c

                                  SHA1

                                  eef236b1dd4b01ef4fcb385ae86d398ef4c04631

                                  SHA256

                                  44c9d7225f210653f9148c4da6d0a4b169bd5c6bb392c0f6ed02e3284d743d76

                                  SHA512

                                  75c790b1455f93f009a58377dfb702a26ca472e0bf860e96c545bc53ec4c45704af432e6b3b33f1d765b770f0c77c31386cf4bd4b181ef6fd6d13a0258d04423

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  183KB

                                  MD5

                                  1df4b080fdac8086023639cb8497239b

                                  SHA1

                                  b5f4fe25426d1349848ce279edac09ec7388da4c

                                  SHA256

                                  6fad579fedc725281f6adc127d69c65b00b86ce9138659affb03714d0ac53547

                                  SHA512

                                  9b5681ef4df560ec3011958de250034939457cf9e34323b1d2c74eb52f623691ee86c0f3c51c69295e1c942a90dbee9993ac50c3c3f3ad78bc947ceddfc49a34

                                • C:\Users\Admin\AppData\Local\Temp\Celery\CefSharp.BrowserSubprocess.Core.dll

                                  Filesize

                                  1.1MB

                                  MD5

                                  5b745ee879e65f7a47c56265881f16e7

                                  SHA1

                                  e6a90771b8f1bf53beeb7c9e4268756ff07a088d

                                  SHA256

                                  c8944a83938c39fbea72700485db8a61ab82e1c51d8e16d5dd48de4e36a6f264

                                  SHA512

                                  3b4bef98a1f751c3a747de0eb050828bf8474efa68aa7a26d0369f1c3b42829eaab221cb612c005a54ed5b84f19180700e51aab39adb84fe7246d9e91e6899c8

                                • C:\Users\Admin\AppData\Local\Temp\Celery\CefSharp.BrowserSubprocess.exe

                                  Filesize

                                  6KB

                                  MD5

                                  bcd22b9511d5383e23d875e2cf3c339e

                                  SHA1

                                  0ef86afaef536cc4b046ea2866414bb193d60702

                                  SHA256

                                  95dd31f11ac1317559b6eee0479739930d503a4938283f5d831ac8add92ad792

                                  SHA512

                                  c4e6821858720895c0bfae797097e3307bb7ea8f03dde4fefc16cce03b2a50fecfe8ed5c3225136fcd9d74ee0ed8673f795b410cd14890d22df58c1f03b693c6

                                • C:\Users\Admin\AppData\Local\Temp\Celery\CefSharp.Core.Runtime.dll

                                  Filesize

                                  1.7MB

                                  MD5

                                  21719cf581f5cc98b21c748498f1cbfe

                                  SHA1

                                  aaada7a02fadcbd25b836c924e936ce7d7ee0c2a

                                  SHA256

                                  6fd2685e02ef7c92ba5080faadb44f22fee528713f5101e2841c1230cba691e6

                                  SHA512

                                  6394ddabc7ad03895ecddb9943371935e0a2320e933b380a563eaf03d1a039c7180aee763834170c85485416b1af38b55c1dafff7311b25513369b01dce22598

                                • C:\Users\Admin\AppData\Local\Temp\Celery\CefSharp.Core.dll

                                  Filesize

                                  897KB

                                  MD5

                                  16f8a4945f5bdd5c1c6c73541e1ebec3

                                  SHA1

                                  4342762c43f54c4caafaae40f933599a9bb93cb5

                                  SHA256

                                  636f8f865f23f2d47b73f3c16622e10b46437bbf7c89b0a2f70bae6129ab046a

                                  SHA512

                                  04115c425c3015ee4355cde2a6e5e28ec24745ea77761a40c0986b54dc14bc67cb142986988d79df87e75ea54d21ded9384842e01cf0714b84f7378e6a13400d

                                • C:\Users\Admin\AppData\Local\Temp\Celery\CefSharp.Wpf.dll

                                  Filesize

                                  114KB

                                  MD5

                                  36946182df277e84a313c3811adac855

                                  SHA1

                                  bcd21305861e22878271e37604b7b033ec347eb3

                                  SHA256

                                  8507a4662220eca49d7d511183be801cd394f13dc0e9898c55361020fe9a4720

                                  SHA512

                                  80b1e947b1940dccfe5be8a1ba1e8c1d9eacb122d73724a21233164f5b318fa57c249256f621f0f9c1e6a9e4c902eec58827bb899e20f2990f4ade1d685f1abd

                                • C:\Users\Admin\AppData\Local\Temp\Celery\CefSharp.dll

                                  Filesize

                                  272KB

                                  MD5

                                  715c534060757613f0286e1012e0c34a

                                  SHA1

                                  8bf44c4d87b24589c6f08846173015407170b75d

                                  SHA256

                                  f7ad2bbbeb43f166bbbf986bdb2b08c462603c240c605f1c6a7749c643dff3fe

                                  SHA512

                                  fcaec0c107a8703a8263ce5ccc64c2f5bfc01628756b2319fde21b0842652fbeee04c9f8f6d93f7200412d9bd9fad01494bc902501fb92e7d6b319f8d9db78d7

                                • C:\Users\Admin\AppData\Local\Temp\Celery\Celery.exe

                                  Filesize

                                  17.3MB

                                  MD5

                                  3abca1b204b3ca5ccaf2445b447517b7

                                  SHA1

                                  0fba9faa2ea0e4d19c2aa28ca23596643cae7d8a

                                  SHA256

                                  bb43675318cfeb7bd644a7007b44743a08394adb416bbab6f9840f78b3676b25

                                  SHA512

                                  b66b853820313a92995902c4428d6647b126bab92df42409709b00ea9176882ce2cacf7df032bad1d12fa74f6e075d2e919a63973704a8cfdda5e94bd098cdd8

                                • C:\Users\Admin\AppData\Local\Temp\Celery\Celery.exe.config

                                  Filesize

                                  189B

                                  MD5

                                  9dbad5517b46f41dbb0d8780b20ab87e

                                  SHA1

                                  ef6aef0b1ea5d01b6e088a8bf2f429773c04ba5e

                                  SHA256

                                  47e5a0f101af4151d7f13d2d6bfa9b847d5b5e4a98d1f4674b7c015772746cdf

                                  SHA512

                                  43825f5c26c54e1fc5bffcce30caad1449a28c0c9a9432e9ce17d255f8bf6057c1a1002d9471e5b654ab1de08fb6eabf96302cdb3e0fb4b63ba0ff186e903be8

                                • C:\Users\Admin\AppData\Local\Temp\Celery\Microsoft.Bcl.AsyncInterfaces.dll

                                  Filesize

                                  26KB

                                  MD5

                                  ff34978b62d5e0be84a895d9c30f99ae

                                  SHA1

                                  74dc07a8cccee0ca3bf5cf64320230ca1a37ad85

                                  SHA256

                                  80678203bd0203a6594f4e330b22543c0de5059382bb1c9334b7868b8f31b1bc

                                  SHA512

                                  7f207f2e3f9f371b465bca5402db0e5cec3cb842a1f943d3e3dcedc8e5d134f58c7c4df99303c24501c103494b4f16160f86db80893779ce41b287a23574ee28

                                • C:\Users\Admin\AppData\Local\Temp\Celery\Microsoft.Extensions.DependencyInjection.Abstractions.dll

                                  Filesize

                                  62KB

                                  MD5

                                  00053ff3b5744853b9ebf90af4fdd816

                                  SHA1

                                  13c0a343f38b1bb21a3d90146ed92736a8166fe6

                                  SHA256

                                  c5a119ec89471194b505140fba13001fa05f81c4b4725b80bb63ccb4e1408c1e

                                  SHA512

                                  c99fcda5165f8dc7984fb97ce45d00f8b00ca9813b8c591ad86691bd65104bbb86c36b49bb6c638f3b1e9b2642ec9ac830003e894df338acfca2d11296ff9da4

                                • C:\Users\Admin\AppData\Local\Temp\Celery\Microsoft.Extensions.DependencyInjection.dll

                                  Filesize

                                  94KB

                                  MD5

                                  3452007cab829c2ba196f72b261f7dec

                                  SHA1

                                  c5e7cfd490839f2b34252bd26020d7f8961b221b

                                  SHA256

                                  18b39777ee45220217459641991ab700bc9253acaf0940cf6e017e9392b43698

                                  SHA512

                                  a8b83a8582dfee144925a821d09c40f5730f6337b29446c3bce8b225659bdc57a48778081fa866c092d59b4108c1d992e33f9543ae2b4c7554b8ff27b5332cdf

                                • C:\Users\Admin\AppData\Local\Temp\Celery\Newtonsoft.Json.dll

                                  Filesize

                                  695KB

                                  MD5

                                  195ffb7167db3219b217c4fd439eedd6

                                  SHA1

                                  1e76e6099570ede620b76ed47cf8d03a936d49f8

                                  SHA256

                                  e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                  SHA512

                                  56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                • C:\Users\Admin\AppData\Local\Temp\Celery\System.Threading.Tasks.Extensions.dll

                                  Filesize

                                  25KB

                                  MD5

                                  e1e9d7d46e5cd9525c5927dc98d9ecc7

                                  SHA1

                                  2242627282f9e07e37b274ea36fac2d3cd9c9110

                                  SHA256

                                  4f81ffd0dc7204db75afc35ea4291769b07c440592f28894260eea76626a23c6

                                  SHA512

                                  da7ab8c0100e7d074f0e680b28d241940733860dfbdc5b8c78428b76e807f27e44d1c5ec95ee80c0b5098e8c5d5da4d48bce86800164f9734a05035220c3ff11

                                • C:\Users\Admin\AppData\Local\Temp\Celery\System.Windows.Interactivity.dll

                                  Filesize

                                  39KB

                                  MD5

                                  3ab57a33a6e3a1476695d5a6e856c06a

                                  SHA1

                                  dabb4ecffd0c422a8eebff5d4ec8116a6e90d7e7

                                  SHA256

                                  4aace8c8a330ae8429cd8cc1b6804076d3a9ffd633470f91fd36bdd25bb57876

                                  SHA512

                                  58dbfcf9199d72d370e2d98b8ef2713d74207a597c9494b0ecf5e4c7bf7cf60c5e85f4a92b2a1896dff63d9d5107f0d81d7dddbc7203e9e559ab7219eca0df92

                                • C:\Users\Admin\AppData\Local\Temp\Celery\bin\Monaco\assets\theme.json

                                  Filesize

                                  390B

                                  MD5

                                  53140e18fb33e7e9a25e13f57a4190aa

                                  SHA1

                                  dd72190319ae2b7ddb12a137f50fad2579fcc897

                                  SHA256

                                  1cbd08945e5e8612b690e1eb663917cfb4f84f0083bf7d2c2a61f43e6c455e9b

                                  SHA512

                                  fb9b0456c7c9d468b14db242659d2cda36f7457f9035628d92538850a509e78116972e9890edc3b69d4379aaafb6da76ff2876b446b6953e14914cdfe7dc7b94

                                • C:\Users\Admin\AppData\Local\Temp\Celery\bin\lsp\main.exe

                                  Filesize

                                  36.1MB

                                  MD5

                                  43ad962c7acda3e30300e7d0f1add3fb

                                  SHA1

                                  362c217d315f288f375fec7289a2606ed6d4f432

                                  SHA256

                                  534e6212f155fba25a38fba248ce7970e69335492d57443d04037b617260dd9b

                                  SHA512

                                  3822b6b426c85a61c4d754de7c33fdfbca45c9e80f2ba52f4c6ac98ad726109e276851af3612ebb39a6cefa4de9589d412e2805a3bacf7845d2aa22189396e4b

                                • C:\Users\Admin\AppData\Local\Temp\Celery\chrome_100_percent.pak

                                  Filesize

                                  682KB

                                  MD5

                                  d3e06f624bf92e9d8aecb16da9731c52

                                  SHA1

                                  565bdcbfcbfcd206561080c2000d93470417d142

                                  SHA256

                                  4ee67f0b0b9ad2898e0d70ddfad3541fbd37520686f9e827a845d1930a590362

                                  SHA512

                                  497126af59961054155fbb8c3789d6278a1f5426000342f25f54115429ff024e629783f50f0c5350500007854712b07f7d8174ecfe60d59c4fdd5f3d72dac262

                                • C:\Users\Admin\AppData\Local\Temp\Celery\chrome_200_percent.pak

                                  Filesize

                                  1.1MB

                                  MD5

                                  34572fb491298ed95ad592351fb1f172

                                  SHA1

                                  4590080451f11ff4796d0774de3ff638410abdba

                                  SHA256

                                  c4363d6ecfa5770b021ce72cc7d2ab9be56b0ce88075ec051ad1de99b736dbbd

                                  SHA512

                                  e0e7deccb26b7df78d6193750bfb9aad575b807424a0a5d124bd944e568c1bb1ae29f584246f753d619081a48d2897815145028ffedd9488e9a8f102cdc67e2f

                                • C:\Users\Admin\AppData\Local\Temp\Celery\chrome_elf.dll

                                  Filesize

                                  1.3MB

                                  MD5

                                  5b3802f150c42ad6d24674ae78f9d3e8

                                  SHA1

                                  428139f0a862128e55e5231798f7c8e2df34a92a

                                  SHA256

                                  9f455612e32e5da431c7636773e34bd08dae79403cc8cf5b782b0ea4f1955799

                                  SHA512

                                  07afbd49e17d67957c65929ca7bdfe03b33b299c66c48aa738262da480ed945712d891be83d35bd42833d5465ef60e09c7a5956df0a369ec92d3bc2d25a09007

                                • C:\Users\Admin\AppData\Local\Temp\Celery\d3dcompiler_47.dll

                                  Filesize

                                  4.7MB

                                  MD5

                                  2191e768cc2e19009dad20dc999135a3

                                  SHA1

                                  f49a46ba0e954e657aaed1c9019a53d194272b6a

                                  SHA256

                                  7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d

                                  SHA512

                                  5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970

                                • C:\Users\Admin\AppData\Local\Temp\Celery\debug.log

                                  Filesize

                                  3KB

                                  MD5

                                  62a2dc1b5100f8d8377948804297f341

                                  SHA1

                                  1fc8c3fdc27c98757137feda7d53c684f6f7b71e

                                  SHA256

                                  a19a4ea30f819f95bab6cfe050917a8686c697836b2d5c3f1e2ce9b775973728

                                  SHA512

                                  a659c1baa1c06fa56d0a4b3c550d2e3614feb8e38e037b22f797b2a87b4bbcc176d4453c47f6d909d10c1f1c019f5a55aa959af876e8d05c78c1e1332a7ae431

                                • C:\Users\Admin\AppData\Local\Temp\Celery\debug.log

                                  Filesize

                                  3KB

                                  MD5

                                  90fb07ba3f13c64cee474d3f5134b7fe

                                  SHA1

                                  e3c7fc455cda522d974cf6377c9533d66ee0f793

                                  SHA256

                                  50631b08f07649452eaf3cb05c7ab68c85c534eb726b9c1c9ab4a42e4e4d9544

                                  SHA512

                                  09b6d4019f4d32fc7b08175a87c12631a0cb74af7e33facb34b3b7ad7e7b82137d9f25657f30ead5f7fee21b16e7647e45ed6811995aa1056fb8d1ede7458770

                                • C:\Users\Admin\AppData\Local\Temp\Celery\dxcompiler.dll

                                  Filesize

                                  20.8MB

                                  MD5

                                  141f621285ed586f9423844a83e8a03f

                                  SHA1

                                  9c58feee992c3d42383bde55f0ff7688bc3bd579

                                  SHA256

                                  5592056f52768ba41aad10785d21c1b18baf850a7e6a9e35526f43a55e6ada6d

                                  SHA512

                                  951a55bbe86a7ebecfc946bf1c9a8c629f0e09510089a79a352cd6d89b7c42e0e23fd4f26232b0e73bd6d4ec158b86728cda2ab25745abcabfafadd964b55896

                                • C:\Users\Admin\AppData\Local\Temp\Celery\dxil.dll

                                  Filesize

                                  1.4MB

                                  MD5

                                  cb72bef6ce55aa7c9e3a09bd105dca33

                                  SHA1

                                  d48336e1c8215ccf71a758f2ff7e5913342ea229

                                  SHA256

                                  47ffdbd85438891b7963408ea26151ba26ae1b303bbdab3a55f0f11056085893

                                  SHA512

                                  c89eebcf43196f8660eee19ca41cc60c2a00d93f4b3bf118fe7a0deccb3f831cac0db04b2f0c5590fa8d388eb1877a3706ba0d58c7a4e38507c6e64cfd6a50a0

                                • C:\Users\Admin\AppData\Local\Temp\Celery\icudtl.dat

                                  Filesize

                                  10.2MB

                                  MD5

                                  74bded81ce10a426df54da39cfa132ff

                                  SHA1

                                  eb26bcc7d24be42bd8cfbded53bd62d605989bbf

                                  SHA256

                                  7bf96c193befbf23514401f8f6568076450ade52dd1595b85e4dfcf3de5f6fb9

                                  SHA512

                                  bd7b7b52d31803b2d4b1fd8cb76481931ed8abb98d779b893d3965231177bdd33386461e1a820b384712013904da094e3cd15ee24a679ddc766132677a8be54a

                                • C:\Users\Admin\AppData\Local\Temp\Celery\libEGL.dll

                                  Filesize

                                  459KB

                                  MD5

                                  ce2c45983f63a6cf0cddce68778124e9

                                  SHA1

                                  6553dc5b4bc68dcb1e9628a718be9c5b481a6677

                                  SHA256

                                  9ca8840bbb5f587848e66d08d36cb5eb30c1c448ef49ce504961ff4ac810c605

                                  SHA512

                                  df81a3356168e78d9810f5e87ca86eb4f56e5f0cb6afdb13408b50778a2d8b18c70b02c6348cd7ba59609ab2956d28eed324706eb65d04bce1159a2d8f1e0e8f

                                • C:\Users\Admin\AppData\Local\Temp\Celery\libGLESv2.dll

                                  Filesize

                                  7.3MB

                                  MD5

                                  c9b090ed25f61aa311a6d03fd8839433

                                  SHA1

                                  f1567aa2fb1fcad3cde1e181a62f5e2bccadaf68

                                  SHA256

                                  c7a7a59cf3c26d6c8b2505996065d49f339764f5718e6f53a9ecec8686c489db

                                  SHA512

                                  21cd4618b6ad011afa78abe8fbc42ecafbb992322912c4a77e5f193a04aeb97a5655dedfc513e1a7667db55b92a322e3d9a6dfe7e845af25f37a6666a1798470

                                • C:\Users\Admin\AppData\Local\Temp\Celery\resources.pak

                                  Filesize

                                  7.9MB

                                  MD5

                                  5955471c84eaad269c23f8a22b71f781

                                  SHA1

                                  d625fb0b12d132fec9f91cbc7db54887589f202e

                                  SHA256

                                  b8ae091d95e927a75a9b0a367a8ee9bc5fae0a10427eb77cb3c3460097cd4f5e

                                  SHA512

                                  537fa6f414c7759e70ad6e70350571221ba69afaf89427c7450acf117e58a97fc7beb2a1758cf05b2ef76a14ad50e762f01b1c65d1ccbc63e4d714af445988df

                                • C:\Users\Admin\AppData\Local\Temp\Celery\v8_context_snapshot.bin

                                  Filesize

                                  672KB

                                  MD5

                                  12c20b1ea7dccafb8250e13e46bc9914

                                  SHA1

                                  6ed3625dffea1ad3e1aceae4c55caaf195fd7c18

                                  SHA256

                                  5591258720aed178de57b4e61eb59b2c4af2566caa1d18a7157cf8d0feca11d7

                                  SHA512

                                  e520e67eba1dcf236a0daf43ec57182821b1e9142592ef471c724caf74292ed85291bd3b84fef6107ee2c258f93ea4fff2df18485537d73ddfd973b863c76727

                                • C:\Users\Admin\AppData\Local\Temp\Celery\vk_swiftshader.dll

                                  Filesize

                                  4.9MB

                                  MD5

                                  3262e23f3fef8b021b93c801f5649c92

                                  SHA1

                                  de49b94cfc981a0af5a4e134854f69620e7ba566

                                  SHA256

                                  1c9098e8a6f21462864a91e74555f299ebc41d3bc79d6ee1b9c577c929957285

                                  SHA512

                                  54b0b26b95f6fc799b3e24863a65ef3896786811be3cc9fffa2a06e95e98daf32b16f0ede6b8a87acc319ea17650cdd089c56798236476b894054195738e1797

                                • C:\Users\Admin\AppData\Roaming\Celery\settings.json

                                  Filesize

                                  116B

                                  MD5

                                  53bd3a85ae0f3c6b08b3c6a6fc58c127

                                  SHA1

                                  686e0e83a7b5279d4efb62b0dd3cd7b9a94195cf

                                  SHA256

                                  69b2c2fa52825ccd32572f2a9083388c8a6d799a6ac72c788fb7a63c1a18387a

                                  SHA512

                                  3c2fdfc69977de09b71cc7dd35e3a63c269bccbbc5e065856336ec3f94fa134f57d763a72069ed98e0bea585b590f45922ae8513478e0c711d8429294e56091a

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                  Filesize

                                  2B

                                  MD5

                                  f3b25701fe362ec84616a93a45ce9998

                                  SHA1

                                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                  SHA256

                                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                  SHA512

                                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                • memory/3144-7-0x0000000074FF0000-0x00000000757A0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3144-3-0x0000000007FE0000-0x0000000007FE8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/3144-5-0x0000000008730000-0x0000000008768000-memory.dmp

                                  Filesize

                                  224KB

                                • memory/3144-6-0x00000000080E0000-0x00000000080EE000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/3144-13-0x00000000013A0000-0x00000000013AA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3144-4-0x0000000074FF0000-0x00000000757A0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3144-8-0x000000000A510000-0x000000000A696000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/3144-9-0x0000000074FFE000-0x0000000074FFF000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3144-10-0x0000000074FF0000-0x00000000757A0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3144-1-0x0000000000910000-0x00000000009E2000-memory.dmp

                                  Filesize

                                  840KB

                                • memory/3144-11-0x0000000074FF0000-0x00000000757A0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3144-0-0x0000000074FFE000-0x0000000074FFF000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3144-96-0x0000000074FF0000-0x00000000757A0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3144-12-0x0000000004E30000-0x0000000004E42000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/3144-2-0x0000000074FF0000-0x00000000757A0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3260-134-0x000002423D930000-0x000002423D936000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/3260-138-0x0000024257D90000-0x0000024257EAE000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/4440-147-0x000001E4F8C00000-0x000001E4F8C12000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/4440-317-0x000001E4FB410000-0x000001E4FB448000-memory.dmp

                                  Filesize

                                  224KB

                                • memory/4440-318-0x000001E4F8980000-0x000001E4F898E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/4440-315-0x000001E4F8970000-0x000001E4F8980000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4440-93-0x00007FFC61B43000-0x00007FFC61B45000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4440-313-0x000001E4FBA40000-0x000001E4FBA48000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/4440-97-0x000001E4F16A0000-0x000001E4F27EC000-memory.dmp

                                  Filesize

                                  17.3MB

                                • memory/4440-99-0x000001E4F4BB0000-0x000001E4F4BD4000-memory.dmp

                                  Filesize

                                  144KB

                                • memory/4440-290-0x000001E4F8DB0000-0x000001E4F8DD2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/4440-287-0x000001E4F8E30000-0x000001E4F8EE2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4440-101-0x000001E4F6520000-0x000001E4F6606000-memory.dmp

                                  Filesize

                                  920KB

                                • memory/4440-103-0x000001E4F2D00000-0x000001E4F2D14000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/4440-119-0x00007FFC61B40000-0x00007FFC62601000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4440-372-0x00007FFC61B43000-0x00007FFC61B45000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4440-556-0x00007FFC61B40000-0x00007FFC62601000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4440-148-0x000001E4F89C0000-0x000001E4F89CA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/4440-105-0x000001E4F4CE0000-0x000001E4F4CFC000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/4440-109-0x000001E4F2CE0000-0x000001E4F2CEA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/4440-107-0x000001E4F2BB0000-0x000001E4F2BBA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/4440-113-0x000001E4F6610000-0x000001E4F67D1000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4440-121-0x000001E4F68E0000-0x000001E4F692A000-memory.dmp

                                  Filesize

                                  296KB