Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/09/2024, 11:14

240909-nb99ysxcpc 7

09/09/2024, 11:07

240909-m7y15axbjh 7

09/09/2024, 10:00

240909-l1lxjsscql 7

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/09/2024, 11:07

General

  • Target

    https://cdn.discordapp.com/attachments/1282630600351678464/1282641182261907476/FreakCheats.zip?ex=66e01830&is=66dec6b0&hm=8abd8681652156cfc287f53c232c6ca09af1acb446e1c0c104cebb9faf160192&

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 29 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1282630600351678464/1282641182261907476/FreakCheats.zip?ex=66e01830&is=66dec6b0&hm=8abd8681652156cfc287f53c232c6ca09af1acb446e1c0c104cebb9faf160192&
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff959603cb8,0x7ff959603cc8,0x7ff959603cd8
      2⤵
        PID:3116
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1880 /prefetch:2
        2⤵
          PID:3876
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1088
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:8
          2⤵
            PID:2100
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
            2⤵
              PID:2188
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
              2⤵
                PID:3812
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3144
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
                2⤵
                  PID:4064
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:1
                  2⤵
                    PID:2856
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:1
                    2⤵
                      PID:1420
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:1
                      2⤵
                        PID:3768
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:1
                        2⤵
                          PID:4200
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1712
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 /prefetch:8
                          2⤵
                          • NTFS ADS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2668
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,15986800453851822750,7154602937849094959,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6316 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1688
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:4924
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2348
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:2600
                            • C:\Users\Admin\Downloads\FreakCheats\FreakCheats\FreakCheats.exe
                              "C:\Users\Admin\Downloads\FreakCheats\FreakCheats\FreakCheats.exe"
                              1⤵
                                PID:1892
                                • C:\Users\Admin\Downloads\FreakCheats\FreakCheats\FreakCheats.exe
                                  "C:\Users\Admin\Downloads\FreakCheats\FreakCheats\FreakCheats.exe"
                                  2⤵
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1936
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "start main.exe"
                                    3⤵
                                      PID:3548
                                      • C:\Users\Admin\Downloads\FreakCheats\FreakCheats\main.exe
                                        main.exe
                                        4⤵
                                          PID:4128
                                          • C:\Users\Admin\Downloads\FreakCheats\FreakCheats\main.exe
                                            main.exe
                                            5⤵
                                            • Loads dropped DLL
                                            PID:2800
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "start main.exe"
                                        3⤵
                                          PID:2412
                                          • C:\Users\Admin\Downloads\FreakCheats\FreakCheats\main.exe
                                            main.exe
                                            4⤵
                                              PID:5076
                                              • C:\Users\Admin\Downloads\FreakCheats\FreakCheats\main.exe
                                                main.exe
                                                5⤵
                                                • Loads dropped DLL
                                                PID:4052

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        3e2612636cf368bc811fdc8db09e037d

                                        SHA1

                                        d69e34379f97e35083f4c4ea1249e6f1a5f51d56

                                        SHA256

                                        2eecaacf3f2582e202689a16b0ac1715c628d32f54261671cf67ba6abbf6c9f9

                                        SHA512

                                        b3cc3bf967d014f522e6811448c4792eed730e72547f83eb4974e832e958deb7e7f4c3ce8e0ed6f9c110525d0b12f7fe7ab80a914c2fe492e1f2d321ef47f96d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        e8115549491cca16e7bfdfec9db7f89a

                                        SHA1

                                        d1eb5c8263cbe146cd88953bb9886c3aeb262742

                                        SHA256

                                        dfa9a8b54936607a5250bec0ed3e2a24f96f4929ca550115a91d0d5d68e4d08e

                                        SHA512

                                        851207c15de3531bd230baf02a8a96550b81649ccbdd44ad74875d97a700271ef96e8be6e1c95b2a0119561aee24729cb55c29eb0b3455473688ef9132ed7f54

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        186B

                                        MD5

                                        094ab275342c45551894b7940ae9ad0d

                                        SHA1

                                        2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                                        SHA256

                                        ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                                        SHA512

                                        19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        7c47f2f2d9393288cd21b084d51e2a27

                                        SHA1

                                        4285360363bbd34cad1f758a19aca3cbb81e63ca

                                        SHA256

                                        276453e3fc187690ba850c435bcdeb82d3958527259dfb7728bc2e1f0c61235d

                                        SHA512

                                        d7d36437a1a989732ef20865db887b7c41e6c3c36567526d2d1b7d7fad63bf86c3ebf0df6babf7e83f9e14b734e7a03d9ee61548d0d3a4e86368d30fdd7f68e2

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        8e5796296901f0ccac1899e780f5fb80

                                        SHA1

                                        84f0042927c923d9325c1a018d02f8327f559c2e

                                        SHA256

                                        a97fb1fe1cef4af95f26bddaa2e2cfa0461b56709702944e65650f71f0552ab1

                                        SHA512

                                        22b058ffbb5de0d576d34729085dfae55a0a43208544d23d00995b4796eded76a508abbbd14429205bd862c89bd895df0dc2d9bbc8adcc88e57faf5dba47e7d0

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        206702161f94c5cd39fadd03f4014d98

                                        SHA1

                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                        SHA256

                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                        SHA512

                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        da53c0e7e6fc8a58600d20812312c003

                                        SHA1

                                        b961b844832820e52c6b7cb923dcff6f8970aa82

                                        SHA256

                                        f05799dd14d01c16786352ed6f72ca9de5f21151ed89e098d68d14640307ac93

                                        SHA512

                                        162f7792f8721f72889d2be35392ff161c5d4d253e07b54d761b83b965b3394d641e4717892c1f2ec2bbc6f2da05740244d99c490847cd58cfafe6aa948c8d11

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        cea93816baf762c8202db0f142ebaa11

                                        SHA1

                                        fa89511e9ef6bf9423523978d8d3b794bb2de007

                                        SHA256

                                        4e478c27b7178a6cc3dbd057bf1347f820ede3bfa11c400a3b0909f7375d6d70

                                        SHA512

                                        1758df072b7f1457eddf611c10a8044a726cba252309fc946e15cd2529a3df1f8f4df32a757d8208c01f282902f05dd44511505efa89c13f7530134f9851c230

                                      • C:\Users\Admin\AppData\Local\Temp\MSI7AJ92A.tmp-\busser.txt

                                        Filesize

                                        28B

                                        MD5

                                        e7e433db9d2a6958932b0faff3e7cf8f

                                        SHA1

                                        3c6257462a2d30ac3361daf3e78e8bd4cbc98067

                                        SHA256

                                        395f80c48f9744e3f6812444732700d1c935423be6e3a033423c9b7aa55c3878

                                        SHA512

                                        23f2cb01aee39542660b4026cfb01b34f2a6c0b5f784456cf0d2269574e4c4f7ca6498fd36fc1e02bb7715cc473689d69d78dec1f4f395e7cb8cb11ea5dc167b

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\VCRUNTIME140.dll

                                        Filesize

                                        116KB

                                        MD5

                                        be8dbe2dc77ebe7f88f910c61aec691a

                                        SHA1

                                        a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                        SHA256

                                        4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                        SHA512

                                        0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\VCRUNTIME140_1.dll

                                        Filesize

                                        48KB

                                        MD5

                                        f8dfa78045620cf8a732e67d1b1eb53d

                                        SHA1

                                        ff9a604d8c99405bfdbbf4295825d3fcbc792704

                                        SHA256

                                        a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

                                        SHA512

                                        ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_asyncio.pyd

                                        Filesize

                                        69KB

                                        MD5

                                        cc0f232f2a8a359dee29a573667e6d77

                                        SHA1

                                        d3ffbf5606d9c77a0de0b7456f7a5314f420b1f7

                                        SHA256

                                        7a5c88ce496bafdf31a94ae6d70b017070703bc0a7da1dfae7c12b21bb61030d

                                        SHA512

                                        48484177bf55179607d66f5a5837a35cd586e8a9fb185de8b10865aab650b056a61d1dc96370c5efc6955ccb4e34b31810f8e1c8f5f02d268f565a73b4ff5657

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_bz2.pyd

                                        Filesize

                                        83KB

                                        MD5

                                        dd26ed92888de9c57660a7ad631bb916

                                        SHA1

                                        77d479d44d9e04f0a1355569332233459b69a154

                                        SHA256

                                        324268786921ec940cbd4b5e2f71dafd08e578a12e373a715658527e5b211697

                                        SHA512

                                        d693367565005c1b87823e781dc5925146512182c8d8a3a2201e712c88df1c0e66e65ecaec9af22037f0a8f8b3fb3f511ea47cfd5774651d71673fab612d2897

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_ctypes.pyd

                                        Filesize

                                        122KB

                                        MD5

                                        c8afa1ebb28828e1115c110313d2a810

                                        SHA1

                                        1d0d28799a5dbe313b6f4ddfdb7986d2902fa97a

                                        SHA256

                                        8978972cf341ccd0edf8435d63909a739df7ef29ec7dd57ed5cab64b342891f0

                                        SHA512

                                        4d9f41bd23b62600d1eb097d1578ba656b5e13fd2f31ef74202aa511111969bb8cfc2a8e903de73bd6e63fadaa59b078714885b8c5b8ecc5c4128ff9d06c1e56

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_decimal.pyd

                                        Filesize

                                        251KB

                                        MD5

                                        cea3b419c7ca87140a157629c6dbd299

                                        SHA1

                                        7dbff775235b1937b150ae70302b3208833dc9be

                                        SHA256

                                        95b9850e6fb335b235589dd1348e007507c6b28e332c9abb111f2a0035c358e5

                                        SHA512

                                        6e3a6781c0f05bb5182073cca1e69b6df55f05ff7cdcea394bacf50f88605e2241b7387f1d8ba9f40a96832d04f55edb80003f0cf1e537a26f99408ee9312f5b

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_hashlib.pyd

                                        Filesize

                                        64KB

                                        MD5

                                        d19cb5ca144ae1fd29b6395b0225cf40

                                        SHA1

                                        5b9ec6e656261ce179dfcfd5c6a3cfe07c2dfeb4

                                        SHA256

                                        f95ec2562a3c70fb1a6e44d72f4223ce3c7a0f0038159d09dce629f59591d5aa

                                        SHA512

                                        9ac3a8a4dbdb09be3760e7ccb11269f82a47b24c03d10d289bcdded9a43e57d3cd656f8d060d66b810382ecac3a62f101f83ea626b58cd0b5a3cca25b67b1519

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_lzma.pyd

                                        Filesize

                                        156KB

                                        MD5

                                        8cfbafe65d6e38dde8e2e8006b66bb3e

                                        SHA1

                                        cb63addd102e47c777d55753c00c29c547e2243c

                                        SHA256

                                        6d548db0ab73291f82cf0f4ca9ec0c81460185319c8965e829faeacae19444ff

                                        SHA512

                                        fa021615d5c080aadcd5b84fd221900054eb763a7af8638f70cf6cd49bd92773074f1ac6884f3ce1d8a15d59439f554381377faee4842ed5beb13ff3e1b510f4

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_multiprocessing.pyd

                                        Filesize

                                        34KB

                                        MD5

                                        eb859fc7f54cba118a321440ad088096

                                        SHA1

                                        9d3c410240f4c5269e07ffbde43d6f5e7cc30b44

                                        SHA256

                                        14bdd15d60b9d6141009aeedc606007c42b46c779a523d21758e57cf126dc2a4

                                        SHA512

                                        694a9c1cc3dc78b47faedf66248ff078e5090cfab22e95c123fb99b10192a5748748a5f0937ffd9fd8e1873ad48f290be723fe194b7eb2a731add7f5fb776c4a

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_overlapped.pyd

                                        Filesize

                                        54KB

                                        MD5

                                        df92ea698a3d0729b70a4306bbe3029f

                                        SHA1

                                        b82f3a43568148c64a46e2774aec39bf1f2d3c1e

                                        SHA256

                                        46dec978ec8cb2146854739bfeddea93335dcc92a25d719352b94f9517855032

                                        SHA512

                                        bdebafe1b40244a0cb6c97e75424f79cfe395774a9d03cdb02f82083110c1f4bdcac2819ba1845ad1c56e2d2e6506dcc1833e4eb269bb0f620f0eb73b4d47817

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_queue.pyd

                                        Filesize

                                        31KB

                                        MD5

                                        7d91dd8e5f1dbc3058ea399f5f31c1e6

                                        SHA1

                                        b983653b9f2df66e721ece95f086c2f933d303fc

                                        SHA256

                                        76bba42b1392dc57a867aef385b990fa302a4f1dcf453705ac119c9c98a36e8d

                                        SHA512

                                        b8e7369da79255a4bb2ed91ba0c313b4578ee45c94e6bc74582fc14f8b2984ed8fcda0434a5bd3b72ea704e6e8fd8cbf1901f325e774475e4f28961483d6c7cf

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_socket.pyd

                                        Filesize

                                        81KB

                                        MD5

                                        e43aed7d6a8bcd9ddfc59c2d1a2c4b02

                                        SHA1

                                        36f367f68fb9868412246725b604b27b5019d747

                                        SHA256

                                        2c2a6a6ba360e38f0c2b5a53b4626f833a3111844d95615ebf35be0e76b1ef7a

                                        SHA512

                                        d92e26eb88db891de389a464f850a8da0a39af8a4d86d9894768cb97182b8351817ce14fe1eb8301b18b80d1d5d8876a48ba66eb7b874c7c3d7b009fcdbc8c4e

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_ssl.pyd

                                        Filesize

                                        174KB

                                        MD5

                                        6a2b0f8f50b47d05f96deff7883c1270

                                        SHA1

                                        2b1aeb6fe9a12e0d527b042512fc8890eedb10d8

                                        SHA256

                                        68dad60ff6fb36c88ef1c47d1855517bfe8de0f5ddea0f630b65b622a645d53a

                                        SHA512

                                        a080190d4e7e1abb186776ae6e83dab4b21a77093a88fca59ce1f63c683f549a28d094818a0ee44186ddea2095111f1879008c0d631fc4a8d69dd596ef76ca37

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_tkinter.pyd

                                        Filesize

                                        64KB

                                        MD5

                                        e38a6b96f5cc200f21da22d49e321da3

                                        SHA1

                                        4ea69d2b021277ab0b473cfd44e4bfd17e3bac3b

                                        SHA256

                                        f0ebdf2ca7b33c26b8938efa59678068d3840957ee79d2b3c576437f8f913f20

                                        SHA512

                                        3df55cdd44ea4789fb2de9672f421b7ff9ad798917417dcb5b1d8575804306fb7636d436965598085d2e87256ecb476ed69df7af05986f05b9f4a18eed9629e2

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\_wmi.pyd

                                        Filesize

                                        36KB

                                        MD5

                                        bed7b0ced98fa065a9b8fe62e328713f

                                        SHA1

                                        e329ebca2df8889b78ce666e3fb909b4690d2daa

                                        SHA256

                                        5818679010bb536a3d463eeee8ce203e880a8cd1c06bf1cb6c416ab0dc024d94

                                        SHA512

                                        c95f7bb6ca9afba50bf0727e971dff7326ce0e23a4bfa44d62f2ed67ed5fede1b018519dbfa0ed3091d485ed0ace68b52dd0bb2921c9c1e3bc1fa875cd3d2366

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\base_library.zip

                                        Filesize

                                        1.3MB

                                        MD5

                                        48ba559bf70c3ef963f86633530667d6

                                        SHA1

                                        e3319e3a70590767ad00290230d77158f8f8307e

                                        SHA256

                                        f8377aa03b7036e7735e2814452c1759ab7ceec3f8f8a202b697b4132809ce5e

                                        SHA512

                                        567a7bef4a7c7ff0890708c0e62d2af748b645c8b9071953873b0dd5aa789c42796860896a6b5e539651de9a2243338e2a5fb47743c30dfcde59b1787c4c1871

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\certifi\cacert.pem

                                        Filesize

                                        292KB

                                        MD5

                                        50ea156b773e8803f6c1fe712f746cba

                                        SHA1

                                        2c68212e96605210eddf740291862bdf59398aef

                                        SHA256

                                        94edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47

                                        SHA512

                                        01ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\charset_normalizer\md.cp312-win_amd64.pyd

                                        Filesize

                                        10KB

                                        MD5

                                        d9e0217a89d9b9d1d778f7e197e0c191

                                        SHA1

                                        ec692661fcc0b89e0c3bde1773a6168d285b4f0d

                                        SHA256

                                        ecf12e2c0a00c0ed4e2343ea956d78eed55e5a36ba49773633b2dfe7b04335c0

                                        SHA512

                                        3b788ac88c1f2d682c1721c61d223a529697c7e43280686b914467b3b39e7d6debaff4c0e2f42e9dddb28b522f37cb5a3011e91c66d911609c63509f9228133d

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\charset_normalizer\md__mypyc.cp312-win_amd64.pyd

                                        Filesize

                                        120KB

                                        MD5

                                        bf9a9da1cf3c98346002648c3eae6dcf

                                        SHA1

                                        db16c09fdc1722631a7a9c465bfe173d94eb5d8b

                                        SHA256

                                        4107b1d6f11d842074a9f21323290bbe97e8eed4aa778fbc348ee09cc4fa4637

                                        SHA512

                                        7371407d12e632fc8fb031393838d36e6a1fe1e978ced36ff750d84e183cde6dd20f75074f4597742c9f8d6f87af12794c589d596a81b920c6c62ee2ba2e5654

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\libcrypto-3.dll

                                        Filesize

                                        5.0MB

                                        MD5

                                        e547cf6d296a88f5b1c352c116df7c0c

                                        SHA1

                                        cafa14e0367f7c13ad140fd556f10f320a039783

                                        SHA256

                                        05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de

                                        SHA512

                                        9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\libffi-8.dll

                                        Filesize

                                        38KB

                                        MD5

                                        0f8e4992ca92baaf54cc0b43aaccce21

                                        SHA1

                                        c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                                        SHA256

                                        eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                                        SHA512

                                        6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\libssl-3.dll

                                        Filesize

                                        768KB

                                        MD5

                                        19a2aba25456181d5fb572d88ac0e73e

                                        SHA1

                                        656ca8cdfc9c3a6379536e2027e93408851483db

                                        SHA256

                                        2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006

                                        SHA512

                                        df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\pyexpat.pyd

                                        Filesize

                                        197KB

                                        MD5

                                        815f1bdabb79c6a12b38d84aa343196d

                                        SHA1

                                        916483149875a5e20c6046ceffef62dd6089ddd5

                                        SHA256

                                        31712ae276e2ced05ecda3e1c08fbbcc2cff8474a972626aba55f7797f0ed8c9

                                        SHA512

                                        1078e7e48b6f6ed160ae2bccf80a43a5f1cca769b8a690326e112bf20d7f3d018f855f6aa3b56d315dc0853472e0affcfe8e910b5ce69ce952983cfaa496c21d

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\python312.dll

                                        Filesize

                                        6.6MB

                                        MD5

                                        cae8fa4e7cb32da83acf655c2c39d9e1

                                        SHA1

                                        7a0055588a2d232be8c56791642cb0f5abbc71f8

                                        SHA256

                                        8ad53c67c2b4db4387d5f72ee2a3ca80c40af444b22bf41a6cfda2225a27bb93

                                        SHA512

                                        db2190da2c35bceed0ef91d7553ff0dea442286490145c3d0e89db59ba1299b0851e601cc324b5f7fd026414fc73755e8eff2ef5fb5eeb1c54a9e13e7c66dd0c

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\select.pyd

                                        Filesize

                                        30KB

                                        MD5

                                        79ce1ae3a23dff6ed5fc66e6416600cd

                                        SHA1

                                        6204374d99144b0a26fd1d61940ff4f0d17c2212

                                        SHA256

                                        678e09ad44be42fa9bc9c7a18c25dbe995a59b6c36a13eecc09c0f02a647b6f0

                                        SHA512

                                        a4e48696788798a7d061c0ef620d40187850741c2bec357db0e37a2dd94d3a50f9f55ba75dc4d95e50946cbab78b84ba1fc42d51fd498640a231321566613daa

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\setuptools\_vendor\inflect-7.3.1.dist-info\INSTALLER

                                        Filesize

                                        4B

                                        MD5

                                        365c9bfeb7d89244f2ce01c1de44cb85

                                        SHA1

                                        d7a03141d5d6b1e88b6b59ef08b6681df212c599

                                        SHA256

                                        ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

                                        SHA512

                                        d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\setuptools\_vendor\jaraco.text-3.12.1.dist-info\LICENSE

                                        Filesize

                                        1023B

                                        MD5

                                        141643e11c48898150daa83802dbc65f

                                        SHA1

                                        0445ed0f69910eeaee036f09a39a13c6e1f37e12

                                        SHA256

                                        86da0f01aeae46348a3c3d465195dc1ceccde79f79e87769a64b8da04b2a4741

                                        SHA512

                                        ef62311602b466397baf0b23caca66114f8838f9e78e1b067787ceb709d09e0530e85a47bbcd4c5a0905b74fdb30df0cc640910c6cc2e67886e5b18794a3583f

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\setuptools\_vendor\jaraco.text-3.12.1.dist-info\WHEEL

                                        Filesize

                                        92B

                                        MD5

                                        43136dde7dd276932f6197bb6d676ef4

                                        SHA1

                                        6b13c105452c519ea0b65ac1a975bd5e19c50122

                                        SHA256

                                        189eedfe4581172c1b6a02b97a8f48a14c0b5baa3239e4ca990fbd8871553714

                                        SHA512

                                        e7712ba7d36deb083ebcc3b641ad3e7d19fb071ee64ae3a35ad6a50ee882b20cd2e60ca1319199df12584fe311a6266ec74f96a3fb67e59f90c7b5909668aee1

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\setuptools\_vendor\jaraco\text\Lorem ipsum.txt

                                        Filesize

                                        1KB

                                        MD5

                                        4ce7501f6608f6ce4011d627979e1ae4

                                        SHA1

                                        78363672264d9cd3f72d5c1d3665e1657b1a5071

                                        SHA256

                                        37fedcffbf73c4eb9f058f47677cb33203a436ff9390e4d38a8e01c9dad28e0b

                                        SHA512

                                        a4cdf92725e1d740758da4dd28df5d1131f70cef46946b173fe6956cc0341f019d7c4fecc3c9605f354e1308858721dada825b4c19f59c5ad1ce01ab84c46b24

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\tcl86t.dll

                                        Filesize

                                        1.7MB

                                        MD5

                                        3ae729942d15f4f48b1ea8c91880f1f4

                                        SHA1

                                        d27596d14af5adeb02edab74859b763bf6ac2853

                                        SHA256

                                        fe62ca2b01b0ec8a609b48f165ca9c6a91653d3966239243ad352dd4c8961760

                                        SHA512

                                        355800e9152daad675428421b867b6d48e2c8f8be9ca0284f221f27fae198c8f07d90980e04d807b50a88f92ffb946dc53b7564e080e2e0684f7f6ccc84ff245

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\tk86t.dll

                                        Filesize

                                        1.5MB

                                        MD5

                                        966580716c0d6b7eec217071a6df6796

                                        SHA1

                                        e3d2d4a7ec61d920130d7a745586ceb7aad4184d

                                        SHA256

                                        afc13fce0690c0a4b449ec7ed4fb0233a8359911c1c0ba26a285f32895dbb3d2

                                        SHA512

                                        cf0675ea888a6d1547842bcfb27d45815b164337b4a285253716917eb157c6df3cc97cba8ad2ab7096e8f5131889957e0555bae9b5a8b64745ac3d2f174e3224

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\unicodedata.pyd

                                        Filesize

                                        1.1MB

                                        MD5

                                        b848e259fabaf32b4b3c980a0a12488d

                                        SHA1

                                        da2e864e18521c86c7d8968db74bb2b28e4c23e2

                                        SHA256

                                        c65073b65f107e471c9be3c699fb11f774e9a07581f41229582f7b2154b6fc3c

                                        SHA512

                                        4c6953504d1401fe0c74435bceebc5ec7bf8991fd42b659867a3529cee5cc64da54f1ab404e88160e747887a7409098f1a85a546bc40f12f0dde0025408f9e27

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\win32\win32clipboard.pyd

                                        Filesize

                                        27KB

                                        MD5

                                        01c9936ead560347ebad0b628331d4d0

                                        SHA1

                                        9242df0a2af96af6c921c70cef93ce7c77ac1784

                                        SHA256

                                        716affdf4b3ae017d88cb52f7ada2a9b936e19a8362fe32bcfa1c44b9e418e86

                                        SHA512

                                        6ff23c7205001471d779595635e26989c24a458c10a232f71bcec4082c89aa1bee9a5c1703a0edd7414c88a95d49fe588ae2c844bc423bcaacc9b40c34a955b3

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI18922\zlib1.dll

                                        Filesize

                                        143KB

                                        MD5

                                        4fadeda3c1da95337b67d15c282d49d8

                                        SHA1

                                        f49ee3256f8f5746515194114f7ef73d6b6141c0

                                        SHA256

                                        28484bcea1e387c4a41564af8f62c040fe203fe2491e415ce90f3d7f5c7ab013

                                        SHA512

                                        45634caf9d9214f0e45e11a1539d8663b45527e1ae9282558b5fdb8465d90b0fabcf4c0e508504427a597ba390c029bc12068ac17d842fd0fcbb1886d252c6b1

                                      • C:\Users\Admin\Downloads\FreakCheats.zip:Zone.Identifier

                                        Filesize

                                        26B

                                        MD5

                                        fbccf14d504b7b2dbcb5a5bda75bd93b

                                        SHA1

                                        d59fc84cdd5217c6cf74785703655f78da6b582b

                                        SHA256

                                        eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                        SHA512

                                        aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                      • C:\Users\Admin\Downloads\Unconfirmed 103756.crdownload

                                        Filesize

                                        20.8MB

                                        MD5

                                        6c04f945db6b20a6035628c613c09352

                                        SHA1

                                        75284ef7324fb32cc3b9350b374469711bf609e2

                                        SHA256

                                        15f26a83a5d75d01dc234c0b15bb6b8ea7a53324d3e8dd5f753a2904dff72cb2

                                        SHA512

                                        3b57a6a0c9f943e0289a108199fa9470c7da2dd1edf997d8960f15220a2e24acfa6b1b94e503244e898e84b8d836c7392423c715fa9ee196c0c90db6378ffe2b

                                      • memory/1936-1229-0x00007FF944C90000-0x00007FF944CBA000-memory.dmp

                                        Filesize

                                        168KB