Analysis

  • max time kernel
    175s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 23:58

General

  • Target

    https://github.com/CowCoding0/Gartic-Phone-Draw-Bot/releases

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 24 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 37 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/CowCoding0/Gartic-Phone-Draw-Bot/releases
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa198346f8,0x7ffa19834708,0x7ffa19834718
      2⤵
        PID:4904
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
        2⤵
          PID:2932
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4832
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:8
          2⤵
            PID:1412
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
            2⤵
              PID:4240
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
              2⤵
                PID:2000
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:8
                2⤵
                  PID:4584
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1896
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:1
                  2⤵
                    PID:2552
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:1
                    2⤵
                      PID:4952
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1
                      2⤵
                        PID:3704
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4036 /prefetch:8
                        2⤵
                          PID:2228
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6156 /prefetch:8
                          2⤵
                            PID:3652
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:1
                            2⤵
                              PID:4580
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:1
                              2⤵
                                PID:1644
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5252
                              • C:\Users\Admin\Downloads\DrawBot.exe
                                "C:\Users\Admin\Downloads\DrawBot.exe"
                                2⤵
                                • Executes dropped EXE
                                PID:5348
                                • C:\Users\Admin\Downloads\DrawBot.exe
                                  "C:\Users\Admin\Downloads\DrawBot.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Modifies registry class
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of SetWindowsHookEx
                                  PID:5572
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "ver"
                                    4⤵
                                      PID:5720
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2062425816809967571,5338401369692938812,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5380 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4016
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4528
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3304
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:5332

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      9e3fc58a8fb86c93d19e1500b873ef6f

                                      SHA1

                                      c6aae5f4e26f5570db5e14bba8d5061867a33b56

                                      SHA256

                                      828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4

                                      SHA512

                                      e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      27304926d60324abe74d7a4b571c35ea

                                      SHA1

                                      78b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1

                                      SHA256

                                      7039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de

                                      SHA512

                                      f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      1KB

                                      MD5

                                      13a6d65aaa55ed30f6f3cb1bf01d8b2a

                                      SHA1

                                      3d7de2be5eb183b1871840b680b043e3c74c613f

                                      SHA256

                                      c3b97f947492db97c91d09161d5d4b489646d02155a9f985cf22f9b54854256e

                                      SHA512

                                      f394934cff6d1fe2f45fcb847ce3b9c80a47dbd732825a0642ee328035b0a9e6ffd1e44a2e85e82837d6190576785e7649a6c2b34b3f514c4bf53757560a104f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      496B

                                      MD5

                                      1b92794633aaa7d8ca83e408ef516a36

                                      SHA1

                                      4ae0678d6cf8abedb3e9819fc9d7d715d3f72bb6

                                      SHA256

                                      0ff76dc871bd6e59abe386781ef988b4c8d734bca726a4d1eb556d3d78f1e7e0

                                      SHA512

                                      698bb4adf1932dd48fbffb344b0053b9dc753b97a92d88a26341e0c3b0fa2e03481c5193bd2b4a1caaa2aa2f00e41eae73c53aaadc1ac6bb8be17d0f229a61bb

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      37dd27ab6a7393d298b38fabf2b45e4d

                                      SHA1

                                      e9a6d4ee7a9f66b181e54e57d46f70313bab1683

                                      SHA256

                                      98785da71b5e8557a3dae494429bc5abe41df84acfc2bef795f1dd559589a31e

                                      SHA512

                                      30fcf45b8160bcaf4fbde132bb02ae4a07e65ca5e877cc71b03b557a450a2057a44721294f2ea6855489b1bf6c5b1993b8fd435fa3281e37e6ce9c3c6c65ef56

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      e4b94eb53cdf96f3df45fc312b1c6a66

                                      SHA1

                                      07de8b3d319be387518f3283bf94b8fa663ea458

                                      SHA256

                                      e2efd394702cadf5ec6921d55ae9994d4f5229845623d6b98d75aa7311aebe44

                                      SHA512

                                      1eea903559a0d236a66f078802325f39464ed22f922ff429b7ea291fe765ccf3012429899cbe2eb45a4c6d3399dcdf0cce9160a77f24fe73107ee7552e27be63

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      0fadb0649ec8bb6b4418e3b21a959793

                                      SHA1

                                      78f371f75f1d98087a407c023baeb1b047c616c0

                                      SHA256

                                      818e13b2f59139eedc2066c7d13acb42583e7f22e17fb8d29ad224f92f9e232d

                                      SHA512

                                      6cc6e87d6b2bd9745cdba7a2e12c5c4ebdfcbaaeb9e394abb9af9dc8772645d022a25e7bb7c1a7046498e715ea359642ad44ff5bee0d289ca438cdd656a70967

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      db1767eba6fd4a139151f82336eaad4b

                                      SHA1

                                      e9691f3cc584837c41b8494d3e64e168542f2ab4

                                      SHA256

                                      0fb9c976f5fabe0c1bfe2b664ef2142acce12f3fd39a12f62e2a007df9ec60dc

                                      SHA512

                                      e3c3618bf30781cfe69f6c2d58a22a0a03df01176a278decf74bc3bb64d0fb1805b1402ea8437dd32de5e643c758ae1bf4c6a5d9f43bc7e5ee93a09f6ff52024

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\PIL\_imaging.cp38-win_amd64.pyd

                                      Filesize

                                      2.5MB

                                      MD5

                                      c66d257279177dee61c361915692cc7c

                                      SHA1

                                      6c1e096368e486fb135eed1f4b8a3aca5bd641ef

                                      SHA256

                                      a12143791b0afdd56cf213eafe826119932a52bd41569def6d9fe001f0379dbc

                                      SHA512

                                      1aea89ec2cb5b2757c06f0e9225ebdf88f05beb5e5c1f73363058f5c0925637a17c463f8e8dead470aba38ac4906ed777182907a4bc8c188c2c54870a0e9d0a1

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\VCRUNTIME140.dll

                                      Filesize

                                      93KB

                                      MD5

                                      4a365ffdbde27954e768358f4a4ce82e

                                      SHA1

                                      a1b31102eee1d2a4ed1290da2038b7b9f6a104a3

                                      SHA256

                                      6a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c

                                      SHA512

                                      54e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\_bz2.pyd

                                      Filesize

                                      85KB

                                      MD5

                                      a49c5f406456b79254eb65d015b81088

                                      SHA1

                                      cfc2a2a89c63df52947af3610e4d9b8999399c91

                                      SHA256

                                      ce4ef8ed1e72c1d3a6082d500a17a009eb6e8ed15022bf3b68a22291858feced

                                      SHA512

                                      bbafeff8c101c7425dc9b8789117fe4c5e516d217181d3574d9d81b8fec4b0bd34f1e1fe6e406ae95584dc671f788cd7b05c8d700baf59fbf21de9c902edf7ae

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\_ctypes.pyd

                                      Filesize

                                      124KB

                                      MD5

                                      291a0a9b63bae00a4222a6df71a22023

                                      SHA1

                                      7a6a2aad634ec30e8edb2d2d8d0895c708d84551

                                      SHA256

                                      820e840759eed12e19f3c485fd819b065b49d9dc704ae3599a63077416d63324

                                      SHA512

                                      d43ef6fc2595936b17b0a689a00be04968f11d7c28945af4c3a74589bd05f415bf4cb3b4e22ac496490daff533755999a69d5962ccffd12e09c16130ed57fd09

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\_elementtree.pyd

                                      Filesize

                                      175KB

                                      MD5

                                      8216378d8e15d65dbfcb7ba68bbd923a

                                      SHA1

                                      91e3a9a89c236d7018854f7f163bc291a46397c2

                                      SHA256

                                      00d68d3879ab410601e7e8fb2348d4995cec2ee78b3a07ea59520d35f9953bb4

                                      SHA512

                                      2610324ae9510b68745c5500e7a99366e5eaa0a935a43eb951dd78789772ded6cfe9581b6108540a5cac9f848173c9375ee6fd91e40cb6a982114905f7cfd578

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\_hashlib.pyd

                                      Filesize

                                      46KB

                                      MD5

                                      5e5af52f42eaf007e3ac73fd2211f048

                                      SHA1

                                      1a981e66ab5b03f4a74a6bac6227cd45df78010b

                                      SHA256

                                      a30cf1a40e0b09610e34be187f1396ac5a44dcfb27bc7ff9b450d1318b694c1b

                                      SHA512

                                      bc37625005c3dad1129b158a2f1e91628d5c973961e0efd61513bb6c7b97d77922809afca8039d08c11903734450bc098c6e7b63655ff1e9881323e5cfd739fd

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\_lzma.pyd

                                      Filesize

                                      159KB

                                      MD5

                                      cf9fd17b1706f3044a8f74f6d398d5f1

                                      SHA1

                                      c5cd0debbde042445b9722a676ff36a0ac3959ad

                                      SHA256

                                      9209ccc60115727b192bf7771551040ca6fdd50f9bf8c3d2eacbfd424e8245e4

                                      SHA512

                                      5fe922c00c6f7fd3cd9bc56fc51de1f44adffbdb0afc0583f1bb08008be628b9ac16f8560b0c3ba16138e1cdcaf1c525ef24241bed804804cdeb5961aed6385a

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\_queue.pyd

                                      Filesize

                                      28KB

                                      MD5

                                      dd146e2fa08302496b15118bf47703cf

                                      SHA1

                                      d06813e2fcb30cbb00bb3893f30c2661686cf4b7

                                      SHA256

                                      67e4e888559ea2c62ff267b58d7a7e95c2ec361703b5aa232aa8b2a1f96a2051

                                      SHA512

                                      5b93a782c9562370fc5b3f289ca422b4d1a1c532e81bd6c95a0063f2e3889ecf828003e42b674439fc7cd0fa72f64ad607bab6910abe9d959a4fb9fb08df263c

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\_socket.pyd

                                      Filesize

                                      78KB

                                      MD5

                                      4827652de133c83fa1cae839b361856c

                                      SHA1

                                      182f9a04bdc42766cfd5fb352f2cb22e5c26665e

                                      SHA256

                                      87832a3b89e2ada8f704a8f066013660d591d9ce01ce901cc57a3b973f0858ba

                                      SHA512

                                      8d66d68613fdba0820257550de3c39b308b1dce659dca953d10a95ff2cf89c31afe512d30ed44422b31117058dc9fa15279e5ac84694da89b47f99b0ad7e338a

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\_ssl.pyd

                                      Filesize

                                      152KB

                                      MD5

                                      d4dfd8c2894670e9f8d6302c09997300

                                      SHA1

                                      c3a6cc8d8079a06a4cac8950e0baba2b43fb1f8e

                                      SHA256

                                      0a721fc230eca278a69a2006e13dfa00e698274281378d4df35227e1f68ea3e0

                                      SHA512

                                      1422bf45d233e2e3f77dce30ba0123625f2a511f73dfdf42ee093b1755963d9abc371935111c28f0d2c02308c5e82867de2546d871c35e657da32a7182026048

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\_tkinter.pyd

                                      Filesize

                                      64KB

                                      MD5

                                      cc74d36aeedc687d5ee733041042e2e5

                                      SHA1

                                      c304c579d15204eb25198e09a558ec747dea4832

                                      SHA256

                                      d55ef406b4612695499186355a6130885ad522e48556327c0fb409e0345d552d

                                      SHA512

                                      4e7e5330610e9588ad920f120e13260fa1ff94c73f5f286a42dd8475ce8387a8112ed38a5b0de5dcc855a0bcad6324a9b9344d8c576954f4c50a627ec6c34c86

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\base_library.zip

                                      Filesize

                                      760KB

                                      MD5

                                      e1315e6d33e2300bc1d691ed76bc6bf1

                                      SHA1

                                      401075f435707c77904be8915a8c83a422cfe0ee

                                      SHA256

                                      52bd4ea66e4ece6bf404c3617d0c9723966adb9206c507fda8a2850d3c194ad0

                                      SHA512

                                      a1f7172dfa320976da468f9dab24678ae471904ed390b9721f16e7a86db7a11be7664013ef1125fe9f9c35501eb70c758fb9c20babcaf712af0ba9f5b3293e2c

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\certifi\cacert.pem

                                      Filesize

                                      253KB

                                      MD5

                                      3dcd08b803fbb28231e18b5d1eef4258

                                      SHA1

                                      b81ea40b943cd8a0c341f3a13e5bc05090b5a72a

                                      SHA256

                                      de2fa17c4d8ae68dc204a1b6b58b7a7a12569367cfeb8a3a4e1f377c73e83e9e

                                      SHA512

                                      9cc7106e921fbcf8c56745b38051a5a56154c600e3c553f2e64d93ec988c88b17f6d49698bdc18e3aa57ae96a79ee2c08c584c7c4c91cc6ea72db3dca6ccc2f5

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\libcrypto-1_1.dll

                                      Filesize

                                      3.2MB

                                      MD5

                                      89511df61678befa2f62f5025c8c8448

                                      SHA1

                                      df3961f833b4964f70fcf1c002d9fd7309f53ef8

                                      SHA256

                                      296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf

                                      SHA512

                                      9af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\libffi-7.dll

                                      Filesize

                                      32KB

                                      MD5

                                      eef7981412be8ea459064d3090f4b3aa

                                      SHA1

                                      c60da4830ce27afc234b3c3014c583f7f0a5a925

                                      SHA256

                                      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                      SHA512

                                      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\libssl-1_1.dll

                                      Filesize

                                      674KB

                                      MD5

                                      50bcfb04328fec1a22c31c0e39286470

                                      SHA1

                                      3a1b78faf34125c7b8d684419fa715c367db3daa

                                      SHA256

                                      fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9

                                      SHA512

                                      370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\pyexpat.pyd

                                      Filesize

                                      187KB

                                      MD5

                                      2ae23047648257afa90d0ca96811979f

                                      SHA1

                                      0833cf7ccae477faa4656c74d593d0f59844cadd

                                      SHA256

                                      5caf51f12406bdb980db1361fab79c51be8cac0a2a0071a083adf4d84f423e95

                                      SHA512

                                      13052eb183bb7eb8bb2740ff39f63805b69e920f2e21b482657a9995aa002579a88296b81ec415942511d2ed146689d1868b446f7e698e72da22f5c182706030

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\python38.dll

                                      Filesize

                                      4.0MB

                                      MD5

                                      26ba25d468a778d37f1a24f4514d9814

                                      SHA1

                                      b64fe169690557656ede3ae50d3c5a197fea6013

                                      SHA256

                                      2f3e368f5bcc1dda5e951682008a509751e6395f7328fd0f02c4e1a11f67c128

                                      SHA512

                                      80471bfeeab279ce4adfb9ee1962597fb8e1886b861e31bdff1e3aa0df06d93afeb3a3398e9519bab7152d4bd7d88fa9b328a2d7eb50a91eb60fead268912080

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\select.pyd

                                      Filesize

                                      27KB

                                      MD5

                                      e21cff76db11c1066fd96af86332b640

                                      SHA1

                                      e78ef7075c479b1d218132d89bf4bec13d54c06a

                                      SHA256

                                      fcc2e09a2355a5546922874fb4cac92ee00a33c0ed6adbc440d128d1e9f4ec28

                                      SHA512

                                      e86dba2326ca5ea3f5ef3af2abd3c23d5b29b6211acc865b6be5a51d5c8850b7cda8c069e6f631ac62f2047224c4b675bbe6ac97c7ba781de5b8016ebaffd46f

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\tcl86t.dll

                                      Filesize

                                      1.6MB

                                      MD5

                                      c0b23815701dbae2a359cb8adb9ae730

                                      SHA1

                                      5be6736b645ed12e97b9462b77e5a43482673d90

                                      SHA256

                                      f650d6bc321bcda3fc3ac3dec3ac4e473fb0b7b68b6c948581bcfc54653e6768

                                      SHA512

                                      ed60384e95be8ea5930994db8527168f78573f8a277f8d21c089f0018cd3b9906da764ed6fcc1bd4efad009557645e206fbb4e5baef9ab4b2e3c8bb5c3b5d725

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\tcl\encoding\cp1252.enc

                                      Filesize

                                      1KB

                                      MD5

                                      5900f51fd8b5ff75e65594eb7dd50533

                                      SHA1

                                      2e21300e0bc8a847d0423671b08d3c65761ee172

                                      SHA256

                                      14df3ae30e81e7620be6bbb7a9e42083af1ae04d94cf1203565f8a3c0542ace0

                                      SHA512

                                      ea0455ff4cd5c0d4afb5e79b671565c2aede2857d534e1371f0c10c299c74cb4ad113d56025f58b8ae9e88e2862f0864a4836fed236f5730360b2223fde479dc

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\tcl\init.tcl

                                      Filesize

                                      23KB

                                      MD5

                                      b900811a252be90c693e5e7ae365869d

                                      SHA1

                                      345752c46f7e8e67dadef7f6fd514bed4b708fc5

                                      SHA256

                                      bc492b19308bc011cfcd321f1e6e65e6239d4eeb620cc02f7e9bf89002511d4a

                                      SHA512

                                      36b8cdba61b9222f65b055c0c513801f3278a3851912215658bcf0ce10f80197c1f12a5ca3054d8604da005ce08da8dcd303b8544706b642140a49c4377dd6ce

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\tk86t.dll

                                      Filesize

                                      1.4MB

                                      MD5

                                      fdc8a5d96f9576bd70aa1cadc2f21748

                                      SHA1

                                      bae145525a18ce7e5bc69c5f43c6044de7b6e004

                                      SHA256

                                      1a6d0871be2fa7153de22be008a20a5257b721657e6d4b24da8b1f940345d0d5

                                      SHA512

                                      816ada61c1fd941d10e6bb4350baa77f520e2476058249b269802be826bab294a9c18edc5d590f5ed6f8dafed502ab7ffb29db2f44292cb5bedf2f5fa609f49c

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\ucrtbase.dll

                                      Filesize

                                      985KB

                                      MD5

                                      bcfaceeac46f8dc7b6fd1221f68705b9

                                      SHA1

                                      bd46f5f4ce5fcfe98d0bd2aef06073ab1964993d

                                      SHA256

                                      b99cc3d012f09c494ccd90e25188b16cadffd70153020c7c8f074fd06defa5af

                                      SHA512

                                      395b99fa23da2d4ee900a8d01d16f6eaeab8496c978343a5687cae8cbdde7dbc6b580deee5ef8487b4205b2d0f9e6ebf52b184418e4b7e5c2cda0cc089ec59bf

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI53482\unicodedata.pyd

                                      Filesize

                                      1.0MB

                                      MD5

                                      601aee84e12b87ca66826dfc7ca57231

                                      SHA1

                                      3a7812433ca7d443d4494446a9ced24b6774ceca

                                      SHA256

                                      d8091e62c74e1b2b648086f778c3c41ce01f09661a75ea207d3fea2cf26a8762

                                      SHA512

                                      7c2d64623c6cfd66d6729f59909c90aa944e810ff6514c58b2b3142ee90e8660b7ddf7fa187389dd333e47efe8b19e935dd4e9119c15375b69b4880d043877d7

                                    • C:\Users\Admin\Downloads\Unconfirmed 388061.crdownload

                                      Filesize

                                      12.0MB

                                      MD5

                                      d5590d95153ccd6b0ac09020af864010

                                      SHA1

                                      601bdadd9754db56648d7f40a0e19d770740cc79

                                      SHA256

                                      0faddbf09db2c91e8a9b399557c16f4c2429f5025e559a6ed06f933869a89445

                                      SHA512

                                      930d9947e56a199da96be45335824ca355c3b136a85272969464f461e4cf8ec8167a255dbf0af648b1ee8a4572df35c32c71467ecc9dadede1c3e99feac49bf6