Analysis

  • max time kernel
    127s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 01:44

General

  • Target

    https://drive.google.com/file/d/1UhZuVquQSGbGRAjtlcJ9BiZcpGQeSjxl/view?usp=sharing

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 45 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1UhZuVquQSGbGRAjtlcJ9BiZcpGQeSjxl/view?usp=sharing
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85f5346f8,0x7ff85f534708,0x7ff85f534718
      2⤵
        PID:2188
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2
        2⤵
          PID:2076
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4372
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:8
          2⤵
            PID:4328
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
            2⤵
              PID:4888
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
              2⤵
                PID:1832
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:1
                2⤵
                  PID:4860
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:1
                  2⤵
                    PID:1164
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:8
                    2⤵
                      PID:3904
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1504
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:1
                      2⤵
                        PID:4408
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:1
                        2⤵
                          PID:372
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:1
                          2⤵
                            PID:3044
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:1
                            2⤵
                              PID:4736
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6160 /prefetch:8
                              2⤵
                                PID:1544
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:1
                                2⤵
                                  PID:1488
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6684 /prefetch:8
                                  2⤵
                                    PID:5236
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5540
                                  • C:\Users\Admin\Downloads\ransom.exe
                                    "C:\Users\Admin\Downloads\ransom.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    PID:5656
                                    • C:\Users\Admin\Downloads\ransom.exe
                                      "C:\Users\Admin\Downloads\ransom.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3048
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,614946999820168541,17826952755113250951,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3036 /prefetch:2
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:828
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2064
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4520
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:3200
                                      • C:\Users\Admin\Downloads\ransom.exe
                                        "C:\Users\Admin\Downloads\ransom.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        PID:5444
                                        • C:\Users\Admin\Downloads\ransom.exe
                                          "C:\Users\Admin\Downloads\ransom.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5512
                                      • C:\Windows\system32\werfault.exe
                                        werfault.exe /h /shared Global\144f73ff4c054891ba408467ff776dc1 /t 624 /p 5512
                                        1⤵
                                          PID:3408

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          9b008261dda31857d68792b46af6dd6d

                                          SHA1

                                          e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3

                                          SHA256

                                          9ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da

                                          SHA512

                                          78853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          0446fcdd21b016db1f468971fb82a488

                                          SHA1

                                          726b91562bb75f80981f381e3c69d7d832c87c9d

                                          SHA256

                                          62c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222

                                          SHA512

                                          1df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          384B

                                          MD5

                                          7ac875dd7257a2b4dbbd779aaa399aa1

                                          SHA1

                                          cbaa429a981534b618c307f8586bd4d845619df2

                                          SHA256

                                          87361af4b63b2a4b8f218ab65f6bcf608df3b87b035245aaf0dfacd37a049294

                                          SHA512

                                          de52e1a70c6087325184438f6da73cdd479eeb33c37d4a812f8ff25600303245dd85896ec0e4011b9248722a3876747057651cb4313b5c089ce27d0b535e4a92

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          3KB

                                          MD5

                                          4a91b4afde2365ab2f8327100fc7cf88

                                          SHA1

                                          b70713764f1ec09748b0a150454992adbe087054

                                          SHA256

                                          cc02db44780063d9991b86beb71ab792e3037ad72c8f7c3de6e6ba1eabd6ab11

                                          SHA512

                                          79ffb47e0ac0f0a0e3e65270cdaea4fde76f6dde2b4b9d531c2d3954ce1c44e57e560784ac887d068dc72a341bc97fdaf9dfaef18910bf0799370047fa67b631

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          042d81232ba8555c3c1534425488c8a8

                                          SHA1

                                          7a002dc772deb0e8f71deee2ca9ae48c17dd097e

                                          SHA256

                                          7fef125087f2a4073ba7425296025b746d3eaf3f7b106be705345520bd523dbe

                                          SHA512

                                          83347d53cb456701006a57533b579f6ced444b23b5c292bea434583e54838731e343b4fa66d6da9a6c2eb721f6a86a5bfb86f933c30ee6b1c0e3a345f8544de7

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          0168b35cda454370dd1b8353559cde04

                                          SHA1

                                          8e78929d1d115a166c1501206ccb3b3f95799d6b

                                          SHA256

                                          83a1eb75a2e65f8f0cf26dee3b05f82da602c21b52569ff47a3afd7b02887d68

                                          SHA512

                                          48e51ba996ff5e7b7f8ede1c6099dcc70bd5b7a8296e85b78793fa5c85b868b6db7fd861086699f0ebd330808483722f58715e73b95c73e8145c46635d80b0d0

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          229dd353dcc9eb4f9bff10c16e40e588

                                          SHA1

                                          9fc39ed56392e92d09f5b7b1828b17c972d974bb

                                          SHA256

                                          f6514725c4032c83a2c2bd51d2f1d716820973266c1e3a628358ba2c6a7bd201

                                          SHA512

                                          9604dc1069c503d269baaab348f6ac7e01d51e6b30dde224e1254f1112b9fadc6b9537fa04acb5b4fb6fd7021971f8bd3820aaddea8245ab44e158d41ecba001

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          f4c823ecf3a7203fd237c760a5581eab

                                          SHA1

                                          e7d1ee6053cdb85e8178eed1ff2f43856c6a8aa1

                                          SHA256

                                          8e29df374a3d5c255fa7e93cf0675eeef209f9c4dd1b20b8fe8e6d1c3f76ea5d

                                          SHA512

                                          78fb2aa4dbc376013ed871cd0a08c5e3e0c3c07d5bda6f936d39eaa7e9e7b15374e17a3381c84f62cff2ba4d08b2e08cfad43cea1c565b9348c07617cde03010

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          0654a0c511dea670f873e969401d3e22

                                          SHA1

                                          d81196da6a4a2d762fe57af70ea2dbaace34efca

                                          SHA256

                                          e22d509c14331064aadb2c3792f2ac20c0937f58898c6506c8c539a61c904974

                                          SHA512

                                          870e274887bbe9fb2a0121cfad545dcdea6859e891b5c2f1154b6b8164f114b360071d9c424095d61412b3ce24fe2531a8525eeb0b224c66161bd5f568099f09

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          0e62b2164507c100e002cada05ecd52d

                                          SHA1

                                          0c88f0ac724c57ebabd1672db00cab748b00c26f

                                          SHA256

                                          cba1b2791c3d3b74976fb4506d2437f3ae1e18e6b641329c931538720bd05421

                                          SHA512

                                          f4830f65f7f374db9392243b78a2e788aded8f3e585a196361a735481ab5e72dbf5bc36d53a7ffa4cef18129e15ae22f585b8cc90d04224fa2071b5b6a93925c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          f890b4d6c784058f4db0a691527a9e2f

                                          SHA1

                                          9aac62120edd47cd055c7033ea4f6b120876d7b5

                                          SHA256

                                          cc56926d5047a651ebdeba67d6c1823c3fca7a194de82c201ca40d970fe0aa29

                                          SHA512

                                          d7a16fd09da3ee78df3c381fcbce36008905a2f62499b06a3d4b48a7693e065b266d7bcbed1a164fa962f9343932114146f89e2f86f7513faa649b8c9e61a0db

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI54442\PyQt5\Qt5\translations\qt_help_en.qm

                                          Filesize

                                          16B

                                          MD5

                                          bcebcf42735c6849bdecbb77451021dd

                                          SHA1

                                          4884fd9af6890647b7af1aefa57f38cca49ad899

                                          SHA256

                                          9959b510b15d18937848ad13007e30459d2e993c67e564badbfc18f935695c85

                                          SHA512

                                          f951b511ffb1a6b94b1bcae9df26b41b2ff829560583d7c83e70279d1b5304bde299b3679d863cad6bb79d0beda524fc195b7f054ecf11d2090037526b451b78

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\Qt5\bin\MSVCP140.dll

                                          Filesize

                                          576KB

                                          MD5

                                          01b946a2edc5cc166de018dbb754b69c

                                          SHA1

                                          dbe09b7b9ab2d1a61ef63395111d2eb9b04f0a46

                                          SHA256

                                          88f55d86b50b0a7e55e71ad2d8f7552146ba26e927230daf2e26ad3a971973c5

                                          SHA512

                                          65dc3f32faf30e62dfdecb72775df870af4c3a32a0bf576ed1aaae4b16ac6897b62b19e01dc2bf46f46fbe3f475c061f79cbe987eda583fee1817070779860e5

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\Qt5\bin\MSVCP140_1.dll

                                          Filesize

                                          30KB

                                          MD5

                                          0fe6d52eb94c848fe258dc0ec9ff4c11

                                          SHA1

                                          95cc74c64ab80785f3893d61a73b8a958d24da29

                                          SHA256

                                          446c48c1224c289bd3080087fe15d6759416d64f4136addf30086abd5415d83f

                                          SHA512

                                          c39a134210e314627b0f2072f4ffc9b2ce060d44d3365d11d8c1fe908b3b9403ebdd6f33e67d556bd052338d0ed3d5f16b54d628e8290fd3a155f55d36019a86

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\Qt5\bin\Qt5Core.dll

                                          Filesize

                                          5.7MB

                                          MD5

                                          817520432a42efa345b2d97f5c24510e

                                          SHA1

                                          fea7b9c61569d7e76af5effd726b7ff6147961e5

                                          SHA256

                                          8d2ff4ce9096ddccc4f4cd62c2e41fc854cfd1b0d6e8d296645a7f5fd4ae565a

                                          SHA512

                                          8673b26ec5421fce8e23adf720de5690673bb4ce6116cb44ebcc61bbbef12c0ad286dfd675edbed5d8d000efd7609c81aae4533180cf4ec9cd5316e7028f7441

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\Qt5\bin\Qt5Gui.dll

                                          Filesize

                                          6.7MB

                                          MD5

                                          47307a1e2e9987ab422f09771d590ff1

                                          SHA1

                                          0dfc3a947e56c749a75f921f4a850a3dcbf04248

                                          SHA256

                                          5e7d2d41b8b92a880e83b8cc0ca173f5da61218604186196787ee1600956be1e

                                          SHA512

                                          21b1c133334c7ca7bbbe4f00a689c580ff80005749da1aa453cceb293f1ad99f459ca954f54e93b249d406aea038ad3d44d667899b73014f884afdbd9c461c14

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\Qt5\bin\Qt5Widgets.dll

                                          Filesize

                                          5.2MB

                                          MD5

                                          4cd1f8fdcd617932db131c3688845ea8

                                          SHA1

                                          b090ed884b07d2d98747141aefd25590b8b254f9

                                          SHA256

                                          3788c669d4b645e5a576de9fc77fca776bf516d43c89143dc2ca28291ba14358

                                          SHA512

                                          7d47d2661bf8fac937f0d168036652b7cfe0d749b571d9773a5446c512c58ee6bb081fec817181a90f4543ebc2367c7f8881ff7f80908aa48a7f6bb261f1d199

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\Qt5\bin\VCRUNTIME140_1.dll

                                          Filesize

                                          43KB

                                          MD5

                                          6bc084255a5e9eb8df2bcd75b4cd0777

                                          SHA1

                                          cf071ad4e512cd934028f005cabe06384a3954b6

                                          SHA256

                                          1f0f5f2ce671e0f68cf96176721df0e5e6f527c8ca9cfa98aa875b5a3816d460

                                          SHA512

                                          b822538494d13bda947655af791fed4daa811f20c4b63a45246c8f3befa3ec37ff1aa79246c89174fe35d76ffb636fa228afa4bda0bd6d2c41d01228b151fd89

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\Qt5\plugins\platforms\qminimal.dll

                                          Filesize

                                          824KB

                                          MD5

                                          2f6d88f8ec3047deaf174002228219ab

                                          SHA1

                                          eb7242bb0fe74ea78a17d39c76310a7cdd1603a8

                                          SHA256

                                          05d1e7364dd2a672df3ca44dd6fd85bed3d3dc239dcfe29bfb464f10b4daa628

                                          SHA512

                                          0a895ba11c81af14b5bd1a04a450d6dcca531063307c9ef076e9c47bd15f4438837c5d425caee2150f3259691f971d6ee61154748d06d29e4e77da3110053b54

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\QtCore.pyd

                                          Filesize

                                          2.4MB

                                          MD5

                                          678fa1496ffdea3a530fa146dedcdbcc

                                          SHA1

                                          c80d8f1de8ae06ecf5750c83d879d2dcc2d6a4f8

                                          SHA256

                                          d6e45fd8c3b3f93f52c4d1b6f9e3ee220454a73f80f65f3d70504bd55415ea37

                                          SHA512

                                          8d9e3fa49fb42f844d8df241786ea9c0f55e546d373ff07e8c89aac4f3027c62ec1bd0c9c639afeabc034cc39e424b21da55a1609c9f95397a66d5f0d834e88e

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\QtGui.pyd

                                          Filesize

                                          2.4MB

                                          MD5

                                          ae182c36f5839baddc9dcb71192cfa7a

                                          SHA1

                                          c9fa448981ba61343c7d7decacae300cad416957

                                          SHA256

                                          a9408e3b15ff3030f0e9acb3429000d253d3bb7206f750091a7130325f6d0d72

                                          SHA512

                                          8950244d828c5ede5c3934cfe2ee229be19cc00fbf0c4a7ccebec19e8641345ef5fd028511c5428e1e21ce5491a3f74fb0175b03da17588daef918e3f66b206a

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\QtWidgets.pyd

                                          Filesize

                                          4.9MB

                                          MD5

                                          e8c3bfbc19378e541f5f569e2023b7aa

                                          SHA1

                                          aca007030c1cee45cbc692adcb8bcb29665792ba

                                          SHA256

                                          a1e97a2ab434c6ae5e56491c60172e59cdcce42960734e8bdf5d851b79361071

                                          SHA512

                                          9134c2ead00c2d19dec499e60f91e978858766744965ead655d2349ff92834ab267ac8026038e576a7e207d3bbd4a87cd5f2e2846a703c7f481a406130530eb0

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\PyQt5\sip.cp312-win_amd64.pyd

                                          Filesize

                                          117KB

                                          MD5

                                          f57134d35976c48ffb955df1739af5d4

                                          SHA1

                                          c1b3a81352e462d4ecc33ee5119b882d657bed2f

                                          SHA256

                                          9e91b237e2aa69c0c7e268f072999bb0319b04513c9fc97ab7c4371e642375d2

                                          SHA512

                                          db385592876f489460023f2d02fc80635fe4f9746ecd99c8c7622399a34ea43ef631d3668429ad4e8f69552a5c386bbf12f3805a9101f7eb70337ce23e65c80b

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\VCRUNTIME140.dll

                                          Filesize

                                          116KB

                                          MD5

                                          be8dbe2dc77ebe7f88f910c61aec691a

                                          SHA1

                                          a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                          SHA256

                                          4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                          SHA512

                                          0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\VCRUNTIME140_1.dll

                                          Filesize

                                          48KB

                                          MD5

                                          f8dfa78045620cf8a732e67d1b1eb53d

                                          SHA1

                                          ff9a604d8c99405bfdbbf4295825d3fcbc792704

                                          SHA256

                                          a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

                                          SHA512

                                          ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\_bz2.pyd

                                          Filesize

                                          83KB

                                          MD5

                                          223fd6748cae86e8c2d5618085c768ac

                                          SHA1

                                          dcb589f2265728fe97156814cbe6ff3303cd05d3

                                          SHA256

                                          f81dc49eac5ecc528e628175add2ff6bda695a93ea76671d7187155aa6326abb

                                          SHA512

                                          9c22c178417b82e68f71e5b7fe7c0c0a77184ee12bd0dc049373eace7fa66c89458164d124a9167ae760ff9d384b78ca91001e5c151a51ad80c824066b8ecce6

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\_ctypes.pyd

                                          Filesize

                                          122KB

                                          MD5

                                          bbd5533fc875a4a075097a7c6aba865e

                                          SHA1

                                          ab91e62c6d02d211a1c0683cb6c5b0bdd17cbf00

                                          SHA256

                                          be9828a877e412b48d75addc4553d2d2a60ae762a3551f9731b50cae7d65b570

                                          SHA512

                                          23ef351941f459dee7ed2cebbae21969e97b61c0d877cfe15e401c36369d2a2491ca886be789b1a0c5066d6a8835fd06db28b5b28fb6e9df84c2d0b0d8e9850e

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\_decimal.pyd

                                          Filesize

                                          245KB

                                          MD5

                                          3055edf761508190b576e9bf904003aa

                                          SHA1

                                          f0dc8d882b5cd7955cc6dfc8f9834f70a83c7890

                                          SHA256

                                          e4104e47399d3f635a14d649f61250e9fd37f7e65c81ffe11f099923f8532577

                                          SHA512

                                          87538fe20bd2c1150a8fefd0478ffd32e2a9c59d22290464bf5dfb917f6ac7ec874f8b1c70d643a4dc3dd32cbe17e7ea40c0be3ea9dd07039d94ab316f752248

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\_hashlib.pyd

                                          Filesize

                                          64KB

                                          MD5

                                          eedb6d834d96a3dffffb1f65b5f7e5be

                                          SHA1

                                          ed6735cfdd0d1ec21c7568a9923eb377e54b308d

                                          SHA256

                                          79c4cde23397b9a35b54a3c2298b3c7a844454f4387cb0693f15e4facd227dd2

                                          SHA512

                                          527bd7bb2f4031416762595f4ce24cbc6254a50eaf2cc160b930950c4f2b3f5e245a486972148c535f8cd80c78ec6fa8c9a062085d60db8f23d4b21e8ae4c0ad

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\_lzma.pyd

                                          Filesize

                                          156KB

                                          MD5

                                          05e8b2c429aff98b3ae6adc842fb56a3

                                          SHA1

                                          834ddbced68db4fe17c283ab63b2faa2e4163824

                                          SHA256

                                          a6e2a5bb7a33ad9054f178786a031a46ea560faeef1fb96259331500aae9154c

                                          SHA512

                                          badeb99795b89bc7c1f0c36becc7a0b2ce99ecfd6f6bb493bda24b8e57e6712e23f4c509c96a28bc05200910beddc9f1536416bbc922331cae698e813cbb50b3

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\_socket.pyd

                                          Filesize

                                          81KB

                                          MD5

                                          dc06f8d5508be059eae9e29d5ba7e9ec

                                          SHA1

                                          d666c88979075d3b0c6fd3be7c595e83e0cb4e82

                                          SHA256

                                          7daff6aa3851a913ed97995702a5dfb8a27cb7cf00fb496597be777228d7564a

                                          SHA512

                                          57eb36bc1e9be20c85c34b0a535b2349cb13405d60e752016e23603c4648939f1150e4dbebc01ec7b43eb1a6947c182ccb8a806e7e72167ad2e9d98d1fd94ab3

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\base_library.zip

                                          Filesize

                                          1.3MB

                                          MD5

                                          8dad91add129dca41dd17a332a64d593

                                          SHA1

                                          70a4ec5a17ed63caf2407bd76dc116aca7765c0d

                                          SHA256

                                          8de4f013bfecb9431aabaa97bb084fb7de127b365b9478d6f7610959bf0d2783

                                          SHA512

                                          2163414bc01fc30d47d1de763a8332afe96ea7b296665b1a0840d5197b7e56f4963938e69de35cd2bf89158e5e2240a1650d00d86634ac2a5e2ad825455a2d50

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\libcrypto-3.dll

                                          Filesize

                                          5.0MB

                                          MD5

                                          e547cf6d296a88f5b1c352c116df7c0c

                                          SHA1

                                          cafa14e0367f7c13ad140fd556f10f320a039783

                                          SHA256

                                          05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de

                                          SHA512

                                          9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\libffi-8.dll

                                          Filesize

                                          38KB

                                          MD5

                                          0f8e4992ca92baaf54cc0b43aaccce21

                                          SHA1

                                          c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                                          SHA256

                                          eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                                          SHA512

                                          6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\python3.DLL

                                          Filesize

                                          66KB

                                          MD5

                                          79b02450d6ca4852165036c8d4eaed1f

                                          SHA1

                                          ce9ff1b302426d4c94a2d3ea81531d3cb9e583e4

                                          SHA256

                                          d2e348e615a5d3b08b0bac29b91f79b32f0c1d0be48976450042462466b51123

                                          SHA512

                                          47044d18db3a4dd58a93b43034f4fafa66821d157dcfefb85fca2122795f4591dc69a82eb2e0ebd9183075184368850e4caf9c9fea0cfe6f766c73a60ffdf416

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\python312.dll

                                          Filesize

                                          6.6MB

                                          MD5

                                          3c388ce47c0d9117d2a50b3fa5ac981d

                                          SHA1

                                          038484ff7460d03d1d36c23f0de4874cbaea2c48

                                          SHA256

                                          c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb

                                          SHA512

                                          e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\select.pyd

                                          Filesize

                                          29KB

                                          MD5

                                          92b440ca45447ec33e884752e4c65b07

                                          SHA1

                                          5477e21bb511cc33c988140521a4f8c11a427bcc

                                          SHA256

                                          680df34fb908c49410ac5f68a8c05d92858acd111e62d1194d15bdce520bd6c3

                                          SHA512

                                          40e60e1d1445592c5e8eb352a4052db28b1739a29e16b884b0ba15917b058e66196988214ce473ba158704837b101a13195d5e48cb1dc2f07262dfecfe8d8191

                                        • C:\Users\Admin\AppData\Local\Temp\_MEI56562\unicodedata.pyd

                                          Filesize

                                          1.1MB

                                          MD5

                                          16be9a6f941f1a2cb6b5fca766309b2c

                                          SHA1

                                          17b23ae0e6a11d5b8159c748073e36a936f3316a

                                          SHA256

                                          10ffd5207eeff5a836b330b237d766365d746c30e01abf0fd01f78548d1f1b04

                                          SHA512

                                          64b7ecc58ae7cf128f03a0d5d5428aaa0d4ad4ae7e7d19be0ea819bbbf99503836bfe4946df8ee3ab8a92331fdd002ab9a9de5146af3e86fef789ce46810796b

                                        • C:\Users\Admin\Downloads\Unconfirmed 877373.crdownload

                                          Filesize

                                          35.6MB

                                          MD5

                                          f7da67ebe1a22dc04fa71c74c5bec5fb

                                          SHA1

                                          18c9c57f2a95c16a6333395596807357549be8a9

                                          SHA256

                                          08fdd44bf8e2b954993478be91c17c453b6018e59f7d9443d8f38f6399f1d946

                                          SHA512

                                          5428ea2b6d126240b93b3af4b306555a60504cf1dbb8f8e4f6dc63d84c5d26a452ea5e7f8a22717005b07e4dbfc5389fe6fd361131c73e1e547afe26c043c881

                                        • memory/3048-315-0x00007FF84B280000-0x00007FF84B7C1000-memory.dmp

                                          Filesize

                                          5.3MB

                                        • memory/3048-314-0x00007FF84BE90000-0x00007FF84C37C000-memory.dmp

                                          Filesize

                                          4.9MB

                                        • memory/3048-295-0x00007FF84CEF0000-0x00007FF84D153000-memory.dmp

                                          Filesize

                                          2.4MB

                                        • memory/3048-318-0x00007FF84B010000-0x00007FF84B275000-memory.dmp

                                          Filesize

                                          2.4MB

                                        • memory/5512-587-0x00007FF84BBB0000-0x00007FF84BE13000-memory.dmp

                                          Filesize

                                          2.4MB

                                        • memory/5512-589-0x00007FF84A6A0000-0x00007FF84ABE1000-memory.dmp

                                          Filesize

                                          5.3MB

                                        • memory/5512-590-0x00007FF84A430000-0x00007FF84A695000-memory.dmp

                                          Filesize

                                          2.4MB

                                        • memory/5512-588-0x00007FF84ABF0000-0x00007FF84B0DC000-memory.dmp

                                          Filesize

                                          4.9MB