Resubmissions

19-10-2024 05:09

241019-ftdppsyfre 10

19-10-2024 03:13

241019-dqzfwstepa 10

19-10-2024 03:08

241019-dnezgawbmk 10

19-10-2024 03:03

241019-dj3vqstbqe 10

Analysis

  • max time kernel
    762s
  • max time network
    766s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2024 03:13

Errors

Reason
Machine shutdown

General

  • Target

    source_prepared.exe

  • Size

    102.9MB

  • MD5

    55b3f067577169e8f69c40ed6169af7c

  • SHA1

    d39e828b4eecdaafbcc331eb5f82829f85e902c6

  • SHA256

    e503ecf3527bfc5b2d734b5ac58fd1d740726e554d5b3fa1a5fb53fe27e1ffaa

  • SHA512

    989678d8076c3beb138286dd921066ee845372f21eb57259f5f0aee7c33ced17b7954d8b1d4f04f37293e437e828b0921fc36c3478eae8d018090f99998e3b20

  • SSDEEP

    3145728:jnG9r78S6xjKcBanL2qHO5iVAunGQbRe0zJcBC6Z2:i1ASWNaBHCin1XcBu

Malware Config

Signatures

  • Enumerates VirtualBox DLL files 2 TTPs 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 27 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
    "C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
      "C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"
      2⤵
      • Enumerates VirtualBox DLL files
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\bryg\""
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4832
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\bryg\activate.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2096
        • C:\Windows\system32\attrib.exe
          attrib +s +h .
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:1392
        • C:\Users\Admin\bryg\bruh.exe
          "bruh.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:8
          • C:\Users\Admin\bryg\bruh.exe
            "bruh.exe"
            5⤵
            • Enumerates VirtualBox DLL files
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5828
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\bryg\""
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4628
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell (Get-CimInstance Win32_ComputerSystemProduct).UUID
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4656
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""
              6⤵
                PID:4048
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "files"
                6⤵
                  PID:4056
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "explorer.exe "C:\Users\YourUserName\Documents""
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4532
                  • C:\Windows\explorer.exe
                    explorer.exe "C:\Users\YourUserName\Documents"
                    7⤵
                      PID:5656
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "C:\Users\YourUserName\Documents""
                    6⤵
                      PID:2672
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "cd Downloads"
                      6⤵
                        PID:4072
                      • C:\Users\Admin\AppData\Local\Temp\_MEI82\imageio_ffmpeg\binaries\ffmpeg-win64-v4.2.2.exe
                        C:\Users\Admin\AppData\Local\Temp\_MEI82\imageio_ffmpeg\binaries\ffmpeg-win64-v4.2.2.exe -version
                        6⤵
                        • Executes dropped EXE
                        PID:1268
                      • C:\Users\Admin\AppData\Local\Temp\_MEI82\imageio_ffmpeg\binaries\ffmpeg-win64-v4.2.2.exe
                        C:\Users\Admin\AppData\Local\Temp\_MEI82\imageio_ffmpeg\binaries\ffmpeg-win64-v4.2.2.exe -hide_banner -encoders
                        6⤵
                        • Executes dropped EXE
                        PID:5780
                      • C:\Users\Admin\AppData\Local\Temp\_MEI82\imageio_ffmpeg\binaries\ffmpeg-win64-v4.2.2.exe
                        C:\Users\Admin\AppData\Local\Temp\_MEI82\imageio_ffmpeg\binaries\ffmpeg-win64-v4.2.2.exe -hide_banner -f lavfi -i nullsrc=s=256x256:d=8 -vcodec libx264 -f null -
                        6⤵
                        • Executes dropped EXE
                        PID:5688
                      • C:\Users\Admin\AppData\Local\Temp\_MEI82\imageio_ffmpeg\binaries\ffmpeg-win64-v4.2.2.exe
                        C:\Users\Admin\AppData\Local\Temp\_MEI82\imageio_ffmpeg\binaries\ffmpeg-win64-v4.2.2.exe -y -f rawvideo -vcodec rawvideo -s 1280x720 -pix_fmt rgb24 -r 30.00 -i - -an -vcodec libx264 -pix_fmt yuv420p -crf 10 -v warning C:\Users\Admin\bryg\recording.mp4
                        6⤵
                        • Executes dropped EXE
                        PID:5984
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "del C:\Users\Admin\bryg\recording.mp4"
                        6⤵
                          PID:4032
                    • C:\Windows\system32\taskkill.exe
                      taskkill /f /im "source_prepared.exe"
                      4⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4224
              • C:\Windows\system32\AUDIODG.EXE
                C:\Windows\system32\AUDIODG.EXE 0x504 0x2f8
                1⤵
                  PID:1680
                • C:\Windows\system32\taskmgr.exe
                  "C:\Windows\system32\taskmgr.exe" /0
                  1⤵
                  • Checks SCSI registry key(s)
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:348
                • C:\Windows\System32\rundll32.exe
                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                  1⤵
                    PID:1952
                  • C:\Windows\system32\msinfo32.exe
                    "C:\Windows\system32\msinfo32.exe" "C:\Users\Admin\Downloads\MoveSync.nfo"
                    1⤵
                    • Checks SCSI registry key(s)
                    • Enumerates system info in registry
                    • Suspicious behavior: GetForegroundWindowSpam
                    PID:3864
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of SetWindowsHookEx
                    PID:2376

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\SDL2.dll

                    Filesize

                    2.4MB

                    MD5

                    83c5ff24eae3b9038d74ad91dc884e32

                    SHA1

                    81bf9f8109d73604768bf5310f1f70af62b72e43

                    SHA256

                    520d0459b91efa32fbccf9027a9ca1fc5aae657e679ce8e90f179f9cf5afd279

                    SHA512

                    38ff01891ad5093d0e4f222c5ab703a540514271bf3b94fb65f910193262af722adb9d4f4d2bd6a54c090a7d631d8c98497b7d78bd21359fdea756ff3ac63689

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\SDL2_image.dll

                    Filesize

                    122KB

                    MD5

                    b8d249a5e394b4e6a954c557af1b80e6

                    SHA1

                    b03bb9d09447114a018110bfb91d56ef8d5ec3bb

                    SHA256

                    1e364af75fee0c83506fbdfd4d5b0e386c4e9c6a33ddbddac61ddb131e360194

                    SHA512

                    2f2e248c3963711f1a9f5d8baea5b8527d1df1748cd7e33bf898a380ae748f7a65629438711ff9a5343e64762ec0b5dc478cdf19fbf7111dac9d11a8427e0007

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\SDL2_mixer.dll

                    Filesize

                    285KB

                    MD5

                    201aa86dc9349396b83eed4c15abe764

                    SHA1

                    1a239c479e275aa7be93c5372b2d35e98d8d8cec

                    SHA256

                    2a0fc5e9f72c2eaec3240cb82b7594a58ccda609485981f256b94d0a4dd8d6f8

                    SHA512

                    bb2cd185d1d936ceca3cc20372c98a1b1542288ad5523ff8b823fb5e842205656ec2f615f076929c69987c7468245a452238b509d37109c9bec26be5f638f3b7

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\SDL2_ttf.dll

                    Filesize

                    1.5MB

                    MD5

                    f187dfdccc102436e27704dc572a2c16

                    SHA1

                    be4d499e66b8c4eb92480e4f520ccd8eaaa39b04

                    SHA256

                    fcdfabdfce868eb33f7514025ff59c1bb6c418f1bcd6ace2300a9cd4053e1d63

                    SHA512

                    75002d96153dfd2bfdd6291f842fb553695ef3997012dae0b9a537c95c3f3a83b844a8d1162faefcddf9e1807f3db23b1a10c2789c95dd5f6fad2286bae91afb

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\VCRUNTIME140.dll

                    Filesize

                    117KB

                    MD5

                    862f820c3251e4ca6fc0ac00e4092239

                    SHA1

                    ef96d84b253041b090c243594f90938e9a487a9a

                    SHA256

                    36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

                    SHA512

                    2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\VCRUNTIME140_1.dll

                    Filesize

                    48KB

                    MD5

                    68156f41ae9a04d89bb6625a5cd222d4

                    SHA1

                    3be29d5c53808186eba3a024be377ee6f267c983

                    SHA256

                    82a2f9ae1e6146ae3cb0f4bc5a62b7227e0384209d9b1aef86bbcc105912f7cd

                    SHA512

                    f7bf8ad7cd8b450050310952c56f6a20b378a972c822ccc253ef3d7381b56ffb3ca6ce3323bea9872674ed1c02017f78ab31e9eb9927fc6b3cba957c247e5d57

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_asyncio.pyd

                    Filesize

                    69KB

                    MD5

                    e74e8b37bd359f581f368ba092eed90e

                    SHA1

                    e6bdc3494dbc5d4ae0434bf4dc3b2952e4827f18

                    SHA256

                    184fc13677c7856e7a8b31dfe79ce68dcea10cdf83a205de2b0d5497fb0ffdf3

                    SHA512

                    29d33593758945a02844e1333ed99d66a0e42eb7e8d0c881197f05d4ec9dad3f1bb490739bc2d64ea9451f4bbbfcc05089a57a7aa1ec22c4091c7edd604b7f7c

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_bz2.pyd

                    Filesize

                    82KB

                    MD5

                    fe499b0a9f7f361fa705e7c81e1011fa

                    SHA1

                    cc1c98754c6dab53f5831b05b4df6635ad3f856d

                    SHA256

                    160b5218c2035cccbaab9dc4ca26d099f433dcb86dbbd96425c933dc796090df

                    SHA512

                    60520c5eb5ccc72ae2a4c0f06c8447d9e9922c5f9f1f195757362fc47651adcc1cdbfef193ae4fec7d7c1a47cf1d9756bd820be996ae145f0fbbbfba327c5742

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_cffi_backend.cp312-win_amd64.pyd

                    Filesize

                    175KB

                    MD5

                    fcb71ce882f99ec085d5875e1228bdc1

                    SHA1

                    763d9afa909c15fea8e016d321f32856ec722094

                    SHA256

                    86f136553ba301c70e7bada8416b77eb4a07f76ccb02f7d73c2999a38fa5fa5b

                    SHA512

                    4a0e98ab450453fd930edc04f0f30976abb9214b693db4b6742d784247fb062c57fafafb51eb04b7b4230039ab3b07d2ffd3454d6e261811f34749f2e35f04d6

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_ctypes.pyd

                    Filesize

                    122KB

                    MD5

                    302ddf5f83b5887ab9c4b8cc4e40b7a6

                    SHA1

                    0aa06af65d072eb835c8d714d0f0733dc2f47e20

                    SHA256

                    8250b4c102abd1dba49fc5b52030caa93ca34e00b86cee6547cc0a7f22326807

                    SHA512

                    5ddc2488fa192d8b662771c698a63faaf109862c8a4dd0df10fb113aef839d012df58346a87178aff9a1b369f82d8ae7819cef4aad542d8bd3f91327feace596

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_decimal.pyd

                    Filesize

                    250KB

                    MD5

                    82321fb8245333842e1c31f874329170

                    SHA1

                    81abb1d3d5c55db53e8aca9bdf74f2dec0aba1a3

                    SHA256

                    b7f9603f98ef232a2c5bce7001d842c01d76ed35171afbd898e6d17facf38b56

                    SHA512

                    0cf932ee0d1242ea9377d054adcd71fdd7ec335abbac865e82987e3979e24cead6939cca19da63a08e08ac64face16950edce7918e02bfc7710f09645fd2fa19

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_elementtree.pyd

                    Filesize

                    130KB

                    MD5

                    57130733d8cbd090be211b8a193bed34

                    SHA1

                    040b499728e76dadda6ad8d05b18729a0e7b639c

                    SHA256

                    c07f2827542a392fde5fa9fe4d079c41d108c2b36c53c4035d1209f67c73e8d2

                    SHA512

                    848ca9236850c8ffb84cb9f50e8746b687032ad6e28832d7e1e955778ab6eede98e610ce4f40cdbdba967937668a77b6c50e5280518d8721e55fbc5e720d1908

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_hashlib.pyd

                    Filesize

                    64KB

                    MD5

                    0abfee1db6c16e8ddaff12cd3e86475b

                    SHA1

                    b2dda9635ede4f2841912cc50cb3ae67eea89fe7

                    SHA256

                    b4cec162b985d34ab768f66e8fa41ed28dc2f273fde6670eeace1d695789b137

                    SHA512

                    0a5cae4e3442af1d62b65e8bf91e0f2a61563c2b971bbf008bfb2de0f038ee472e7bfcc88663dc503b2712e92e6a7e6a5f518ddab1fab2eb435d387b740d2d44

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_lzma.pyd

                    Filesize

                    154KB

                    MD5

                    e3e7e99b3c2ea56065740b69f1a0bc12

                    SHA1

                    79fa083d6e75a18e8b1e81f612acb92d35bb2aea

                    SHA256

                    b095fa2eac97496b515031fbea5737988b18deee86a11f2784f5a551732ddc0c

                    SHA512

                    35cbc30b1ccdc4f5cc9560fc0149373ccd9399eb9297e61d52e6662bb8c56c6a7569d8cfad85aeb057c10558c9352ae086c0467f684fdcf72a137eadf563a909

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_multiprocessing.pyd

                    Filesize

                    34KB

                    MD5

                    4daa82aafc49dd75daea468cc37ef4b0

                    SHA1

                    cbf05abc0eb9a6529aa01955d5feac200e602c89

                    SHA256

                    a197f3485bbe30b3a1612ea2198cef121af440ba799fd6cbf0ad3493150df3ca

                    SHA512

                    473caa70ec832b645296eba3da2dc0bbfc90df15281a9de612a2febf10b7e86d7f20f1c265c7be693bc0d25e11d3d2904f4c2b1039a81ae0e192cfca625408d5

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_overlapped.pyd

                    Filesize

                    54KB

                    MD5

                    b89fca6edba418768147e455085f7cc7

                    SHA1

                    5d41e0990e19ee0d131b4fe8c6ac5b7371d1f83e

                    SHA256

                    2af91c5ab6f05c4be357b93673920eccf3ebcad5e5ec6b0a7b53ef94a5feaad7

                    SHA512

                    a6bd8d62fb1fbebbfa9fee9037effbcbbb48bfa2e6c8b398e036c0bd5f402a4b1c0bf0ad8d80585fe501e00d7fe21b387a0f0e05ad2fcdf3aeb248010cb3f1be

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_queue.pyd

                    Filesize

                    31KB

                    MD5

                    941a3757931719dd40898d88d04690cb

                    SHA1

                    177ede06a3669389512bfc8a9b282d918257bf8b

                    SHA256

                    bbe7736caed8c17c97e2b156f686521a788c25f2004aae34ab0c282c24d57da7

                    SHA512

                    7cfba5c69695c492bf967018b3827073b0c2797b24e1bd43b814fbbb39d1a8b32a2d7ef240e86046e4e07aa06f7266a31b5512d04d98a0d2d3736630c044546e

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_socket.pyd

                    Filesize

                    81KB

                    MD5

                    632336eeead53cfad22eb57f795d5657

                    SHA1

                    62f5f73d21b86cd3b73b68e5faec032618196745

                    SHA256

                    ce3090fff8575b21287df5fc69ae98806646fc302eefadf85e369ad3debad92b

                    SHA512

                    77965b45060545e210cdb044f25e5fd68d6a9150caf1cad7645dbafcf1ce8e1ccbdf8436fbdcbf5f9c293321c8916e114de30ed8897c7db72df7f8d1f98dfb55

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_sqlite3.pyd

                    Filesize

                    122KB

                    MD5

                    d3d748770f9bbcf22f20322250befd5b

                    SHA1

                    0b5ced1de5f6585cfd3edd9d00f75e56d2c0959d

                    SHA256

                    fef8e9f427b47e7758658a876ff1f2d718119af54dbb0498e14c8234571942df

                    SHA512

                    c8027eb9a71c5aaf9d714bfebebad091ed45952ca2867981fd1a4e1fdb9fa409addfbcb1d2dc01732a2216b257300d6a88aaea0742b6e1b1d1abbac5506feabc

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_ssl.pyd

                    Filesize

                    173KB

                    MD5

                    eea3e12970e28545a964a95da7e84e0b

                    SHA1

                    c3ccac86975f2704dabc1ffc3918e81feb3b9ac1

                    SHA256

                    61f00b0543464bba61e0bd1128118326c9bd0cdc592854dd1a31c3d6d8df2b83

                    SHA512

                    9bd5c83e7e0ab24d6be40a31ac469a0d9b4621a2a279a5f3ab2fc6401a08c54aec421bc9461aed533a0211d7dbda0c264c5f05aeb39138403da25c8cda0339e6

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_tkinter.pyd

                    Filesize

                    64KB

                    MD5

                    ed2305190284e384a31337094c9f5239

                    SHA1

                    eb8faebf9fe9438541ca65b9892badc2233a405d

                    SHA256

                    2cad195ba200cd94702403559323c7abf3772a20203a11beae03770a04437de2

                    SHA512

                    139c83ebf748720e64c7a6a8f00f45755d17cd8f754cadc0804ece5753c02e5c95210a8b96a92fff89148ba34568f8b1bd6c33d1d3ba7a75f881446956876893

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_uuid.pyd

                    Filesize

                    25KB

                    MD5

                    48c6cca2fdc2ec83fa0771d92bf1d72f

                    SHA1

                    723a8bb6e715616da003d7c658cf94fb129cd091

                    SHA256

                    869361adf2be930e5c8b492fa2116dc0d0edccbf2c231d39c859ce320be27b31

                    SHA512

                    42fdca831e8398638c06cd54186c63cb434da78234a23d80e0f400c64d4e0e4ef8fa307d115b3775b4f97248bd3ce498d764c6befe11b078ec9fcdd270e8f324

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\_wmi.pyd

                    Filesize

                    37KB

                    MD5

                    fda7d7aada1d15cab2add2f4bd2e59a1

                    SHA1

                    7e61473f2ad5e061ef59105bf4255dbe7db5117a

                    SHA256

                    b0ed1c62b73b291a1b57e3d8882cc269b2fcbb1253f2947da18d9036e0c985d9

                    SHA512

                    95c2934a75507ea2d8c817da7e76ee7567ec29a52018aef195fac779b7ffb440c27722d162f8e416b6ef5d3fd0936c71a55776233293b3dd0124d51118a2b628

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\base_library.zip

                    Filesize

                    1.3MB

                    MD5

                    bed03063e08a571088685625544ce144

                    SHA1

                    56519a1b60314ec43f3af0c5268ecc4647239ba3

                    SHA256

                    0d960743dbf746817b61ff7dd1c8c99b4f8c915de26946be56118cd6bedaebdc

                    SHA512

                    c136e16db86f94b007db42a9bf485a7c255dcc2843b40337e8f22a67028117f5bd5d48f7c1034d7446bb45ea16e530f1216d22740ddb7fab5b39cc33d4c6d995

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\charset_normalizer\md.cp312-win_amd64.pyd

                    Filesize

                    10KB

                    MD5

                    71d96f1dbfcd6f767d81f8254e572751

                    SHA1

                    e70b74430500ed5117547e0cd339d6e6f4613503

                    SHA256

                    611e1b4b9ed6788640f550771744d83e404432830bb8e3063f0b8ec3b98911af

                    SHA512

                    7b10e13b3723db0e826b7c7a52090de999626d5fa6c8f9b4630fdeef515a58c40660fa90589532a6d4377f003b3cb5b9851e276a0b3c83b9709e28e6a66a1d32

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\crypto_clipper.json

                    Filesize

                    155B

                    MD5

                    8bff94a9573315a9d1820d9bb710d97f

                    SHA1

                    e69a43d343794524b771d0a07fd4cb263e5464d5

                    SHA256

                    3f7446866f42bcbeb8426324d3ea58f386f3171abe94279ea7ec773a4adde7d7

                    SHA512

                    d5ece1ea9630488245c578cb22d6d9d902839e53b4550c6232b4fb9389ef6c5d5392426ea4a9e3c461979d6d6aa94ddf3b2755f48e9988864788b530cdfcf80f

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\freetype.dll

                    Filesize

                    639KB

                    MD5

                    236f879a5dd26dc7c118d43396444b1c

                    SHA1

                    5ed3e4e084471cf8600fb5e8c54e11a254914278

                    SHA256

                    1c487392d6d06970ba3c7b52705881f1fb069f607243499276c2f0c033c7df6f

                    SHA512

                    cc9326bf1ae8bf574a4715158eba889d7f0d5e3818e6f57395740a4b593567204d6eef95b6e99d2717128c3bffa34a8031c213ff3f2a05741e1eaf3ca07f2254

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libcrypto-3.dll

                    Filesize

                    5.0MB

                    MD5

                    123ad0908c76ccba4789c084f7a6b8d0

                    SHA1

                    86de58289c8200ed8c1fc51d5f00e38e32c1aad5

                    SHA256

                    4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

                    SHA512

                    80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libffi-8.dll

                    Filesize

                    38KB

                    MD5

                    0f8e4992ca92baaf54cc0b43aaccce21

                    SHA1

                    c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                    SHA256

                    eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                    SHA512

                    6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libjpeg-9.dll

                    Filesize

                    238KB

                    MD5

                    c540308d4a8e6289c40753fdd3e1c960

                    SHA1

                    1b84170212ca51970f794c967465ca7e84000d0e

                    SHA256

                    3a224af540c96574800f5e9acf64b2cdfb9060e727919ec14fbd187a9b5bfe69

                    SHA512

                    1dadc6b92de9af998f83faf216d2ab6483b2dea7cdea3387ac846e924adbf624f36f8093daf5cee6010fea7f3556a5e2fcac494dbc87b5a55ce564c9cd76f92b

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libmodplug-1.dll

                    Filesize

                    259KB

                    MD5

                    ead020db018b03e63a64ebff14c77909

                    SHA1

                    89bb59ae2b3b8ec56416440642076ae7b977080e

                    SHA256

                    0c1a9032812ec4c20003a997423e67b71ecb5e59d62cdc18a5bf591176a9010e

                    SHA512

                    c4742d657e5598c606ceff29c0abb19c588ba7976a7c4bff1df80a3109fe7df25e7d0dace962ec3962a94d2715a4848f2acc997a0552bf8d893ff6e7a78857e5

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libogg-0.dll

                    Filesize

                    25KB

                    MD5

                    307ef797fc1af567101afba8f6ce6a8c

                    SHA1

                    0023f520f874a0c3eb3dc1fe8df73e71bde5f228

                    SHA256

                    57abc4f6a9accdd08bf9a2b022a66640cc626a5bd4dac6c7c4f06a5df61ee1fe

                    SHA512

                    5b0b6049844c6fef0cd2b6b1267130bb6e4c17b26afc898cfc17499ef05e79096cd705007a74578f11a218786119be37289290c5c47541090d7b9dea2908688e

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libopus-0.dll

                    Filesize

                    359KB

                    MD5

                    e1adac219ec78b7b2ac9999d8c2e1c94

                    SHA1

                    6910ec9351bee5c355587e42bbb2d75a65ffc0cf

                    SHA256

                    771cae79410f7fcc4f993a105a18c4ed9e8cbddd6f807a42228d95f575808806

                    SHA512

                    da1912243491227168e23fb92def056b229f9f1d8c35ae122e1a0474b0be84ceb7167b138f2ee5fffd812b80c6aca719250aca6b25931585e224e27384f4cc67

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libopus-0.x64.dll

                    Filesize

                    431KB

                    MD5

                    0e078e75ab375a38f99245b3fefa384a

                    SHA1

                    b4c2fda3d4d72c3e3294beb8aa164887637ca22a

                    SHA256

                    c84da836e8d92421ac305842cfe5a724898ed09d340d46b129e210bdc9448131

                    SHA512

                    fa838dab0a8a07ee7c370dd617073a5f795838c3518a6f79ee17d5ebc48b78cebd680e9c8cbe54f912ceb0ae6112147fb40182bcfdcc194b73aa6bab21427bfd

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libopusfile-0.dll

                    Filesize

                    45KB

                    MD5

                    245498839af5a75cd034190fe805d478

                    SHA1

                    d164c38fd9690b8649afaef7c048f4aabb51dba8

                    SHA256

                    ccaaca81810bd2d1cab4692b4253a639f8d5516996db0e24d881efd3efdcc6a4

                    SHA512

                    4181dea590cbc7a9e06729b79201aa29e8349408cb922de8d4cda555fc099b3e10fee4f5a9ddf1a22eaec8f5ede12f9d6e37ed7ad0486beb12b7330cca51a79e

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libpng16-16.dll

                    Filesize

                    206KB

                    MD5

                    3a26cd3f92436747d2285dcef1fae67f

                    SHA1

                    e3d1403be06beb32fc8dc7e8a58c31e18b586a70

                    SHA256

                    e688b4a4d18f4b6ccc99c6ca4980f51218cb825610775192d9b60b2f05eff2d5

                    SHA512

                    73d651f063246723807d837811ead30e3faca8cb0581603f264c28fea1b2bdb6d874a73c1288c7770e95463786d6945b065d4ca1cf553e08220aea4e78a6f37f

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libssl-3.dll

                    Filesize

                    774KB

                    MD5

                    4ff168aaa6a1d68e7957175c8513f3a2

                    SHA1

                    782f886709febc8c7cebcec4d92c66c4d5dbcf57

                    SHA256

                    2e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950

                    SHA512

                    c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libtiff-5.dll

                    Filesize

                    422KB

                    MD5

                    7d40a697ca6f21a8f09468b9fce565ad

                    SHA1

                    dc3b7f7fc0d9056af370e06f1451a65e77ff07f7

                    SHA256

                    ebfe97ac5ef26b94945af3db5ffd110a4b8e92dc02559bf81ccb33f0d5ebce95

                    SHA512

                    5a195e3123f7f17d92b7eca46b9afa1ea600623ad6929ac29197447bb4d474a068fd5f61fca6731a60514125d3b0b2cafe1ff6be3a0161251a366355b660d61a

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\libwebp-7.dll

                    Filesize

                    437KB

                    MD5

                    2c5aca898ff88eb2c9028bbeefebbd1e

                    SHA1

                    7a0048674ef614bebe6cc83b1228d670372076c9

                    SHA256

                    9a53563b6058f70f2725029b7dd2fe96f869c20e8090031cd303e994dfe07b50

                    SHA512

                    46fe8b151e3a13ab506c4fc8a9f3f0f47b21f64f37097a4f1f573b547443ed23e7b2f489807c1623fbc41015f7da11665d88690d8cd0ddd61aa53789586c5a13

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\portmidi.dll

                    Filesize

                    41KB

                    MD5

                    df538704b8cd0b40096f009fd5d1b767

                    SHA1

                    d2399fbb69d237d43624e987445694ec7e0b8615

                    SHA256

                    c9f8d9043ac1570b10f104f2d00aec791f56261c84ee40773be73d0a3822e013

                    SHA512

                    408de3e99bc1bfb5b10e58ae621c0f9276530913ff26256135fe44ce78016de274cbe4c3e967457eb71870aad34dfeb362058afcebfa2d9e64f05604ab1517d4

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\pyexpat.pyd

                    Filesize

                    196KB

                    MD5

                    b34ca0fcd5e0e4f060fe211273ac2946

                    SHA1

                    f7e978eb8adda4bf74739ef71901e0e3aa12ea8c

                    SHA256

                    b6670d91a76e9f00609752ab19aae0b1ebe00d24d9d8d22068989bbb24d0aa44

                    SHA512

                    010774770dd5c4355c336ece7bfb729d2e616bba62bfb9961324d3b314396f1f535b5adf50621bfc0517c03587c912568e19602173a43f297a5f638aa9296500

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\python3.DLL

                    Filesize

                    66KB

                    MD5

                    2e2bb725b92a3d30b1e42cc43275bb7b

                    SHA1

                    83af34fb6bbb3e24ff309e3ebc637dd3875592a5

                    SHA256

                    d52baca085f88b40f30c855e6c55791e5375c80f60f94057061e77e33f4cad7a

                    SHA512

                    e4a500287f7888b1935df40fd0d0f303b82cbcf0d5621592805f3bb507e8ee8de6b51ba2612500838d653566fad18a04f76322c3ab405ce2fdbbefb5ab89069e

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\python312.dll

                    Filesize

                    6.6MB

                    MD5

                    b243d61f4248909bc721674d70a633de

                    SHA1

                    1d2fb44b29c4ac3cfd5a7437038a0c541fce82fc

                    SHA256

                    93488fa7e631cc0a2bd808b9eee8617280ee9b6ff499ab424a1a1cbf24d77dc7

                    SHA512

                    10460c443c7b9a6d7e39ad6e2421b8ca4d8329f1c4a0ff5b71ce73352d2e9438d45f7d59edb13ce30fad3b4f260bd843f4d9b48522d448310d43e0988e075fcb

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\select.pyd

                    Filesize

                    30KB

                    MD5

                    7e871444ca23860a25b888ee263e2eaf

                    SHA1

                    aa43c9d3abdb1aabda8379f301f8116d0674b590

                    SHA256

                    dca5e6d39c5094ce599143cb82f6d8470f0c2a4ce4443499e73f32ed13333fd0

                    SHA512

                    2e260d3123f7ca612901513b90fe40739e85248da913297d4cca3b2ebd398d9697880d148830e168e474ebfc3d30ede10668c7316ed7668f8b39da7bca59e57d

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\sqlite3.dll

                    Filesize

                    1.5MB

                    MD5

                    8c5644cb9cef2bb0702a4c8007521c98

                    SHA1

                    638af7d40162853d1be85c04125dbf18743bfa1b

                    SHA256

                    2f9c9940e87840ff1b5c4922d8b73c7302d1b12badc860990dfebdf77b4140ee

                    SHA512

                    1f0a6e969bcb37bcd131b1476f21a068f69b9224063e194b3a04a9454e50dd530d3474e82b24a9be727b94272fadfeaea76a896cd0fb579e15fdf7a48b00cc01

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\tcl86t.dll

                    Filesize

                    1.7MB

                    MD5

                    bed46aa40c392c9068aed5f94857d398

                    SHA1

                    227561d5f6a592dedd7a8b0ffe0c284f9bbf23e8

                    SHA256

                    22a1746363151a19e02f92f9b7bc4849038783be34c04f311a11df69fdc1a039

                    SHA512

                    04850421617366faeaa711fd28dcf58ff1bc5aa2b0cb962fbfc47b5ae645b3726f3decc19d0b36b23c6b00210badeefc67f83ba6f0a81d6de57dc27001ac19be

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\tk86t.dll

                    Filesize

                    1.5MB

                    MD5

                    6ddb534ef5c74627802ceef0c90b38f3

                    SHA1

                    ffa3b78435e7a121ba6a3de32a7c3950a3f1cb28

                    SHA256

                    f44fa94865d17e4f0266c8f9a1dd89825d8a0c6c3a63cf4192fc08c8796acabf

                    SHA512

                    0cf66eeaa3aef2c7da560c370865bbd84ac2e94536bf751907bf42f36c05b5d0c46f883b1f35daf9e21e8eec1a7fcad439e21a23e114ab0a3a0daf39e8c95eb0

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\unicodedata.pyd

                    Filesize

                    1.1MB

                    MD5

                    098cc6ad04199442c3e2a60e1243c2dc

                    SHA1

                    4c92c464a8e1e56e1c4d77cd30a0da474a026aaf

                    SHA256

                    64a162d6b11ba10cb11509f3cc445f17beb7acfd064f030b4d59faa1c9894b29

                    SHA512

                    73c28488b42a0bc2f0d2861fed3f5dcccf8959ce19d3121c13c998db496f2822deb40f36f86240c8d3954fd2dc2ba5d63c8a125b62324dcd92fb6c8ba49ff170

                  • C:\Users\Admin\AppData\Local\Temp\_MEI19122\zlib1.dll

                    Filesize

                    106KB

                    MD5

                    5eac41b641e813f2a887c25e7c87a02e

                    SHA1

                    ec3f6cf88711ef8cfb3cc439cb75471a2bb9e1b5

                    SHA256

                    b1f58a17f3bfd55523e7bef685acf5b32d1c2a6f25abdcd442681266fd26ab08

                    SHA512

                    cad34a495f1d67c4d79ed88c5c52cf9f2d724a1748ee92518b8ece4e8f2fe1d443dfe93fb9dba8959c0e44c7973af41eb1471507ab8a5b1200a25d75287d5de5

                  • C:\Users\Admin\AppData\Local\Temp\_MEI82\attrs-24.2.0.dist-info\INSTALLER

                    Filesize

                    4B

                    MD5

                    365c9bfeb7d89244f2ce01c1de44cb85

                    SHA1

                    d7a03141d5d6b1e88b6b59ef08b6681df212c599

                    SHA256

                    ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

                    SHA512

                    d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pl4bzlky.nnm.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • memory/348-3735-0x000001BECA620000-0x000001BECA621000-memory.dmp

                    Filesize

                    4KB

                  • memory/348-3732-0x000001BECA620000-0x000001BECA621000-memory.dmp

                    Filesize

                    4KB

                  • memory/348-3733-0x000001BECA620000-0x000001BECA621000-memory.dmp

                    Filesize

                    4KB

                  • memory/348-3734-0x000001BECA620000-0x000001BECA621000-memory.dmp

                    Filesize

                    4KB

                  • memory/348-3736-0x000001BECA620000-0x000001BECA621000-memory.dmp

                    Filesize

                    4KB

                  • memory/348-3737-0x000001BECA620000-0x000001BECA621000-memory.dmp

                    Filesize

                    4KB

                  • memory/348-3738-0x000001BECA620000-0x000001BECA621000-memory.dmp

                    Filesize

                    4KB

                  • memory/348-3726-0x000001BECA620000-0x000001BECA621000-memory.dmp

                    Filesize

                    4KB

                  • memory/348-3728-0x000001BECA620000-0x000001BECA621000-memory.dmp

                    Filesize

                    4KB

                  • memory/348-3727-0x000001BECA620000-0x000001BECA621000-memory.dmp

                    Filesize

                    4KB

                  • memory/1268-3758-0x00007FF71FC70000-0x00007FF7244C3000-memory.dmp

                    Filesize

                    72.3MB

                  • memory/1268-3753-0x00007FF71FC70000-0x00007FF7244C3000-memory.dmp

                    Filesize

                    72.3MB

                  • memory/1268-3752-0x00007FF71FC70000-0x00007FF7244C3000-memory.dmp

                    Filesize

                    72.3MB

                  • memory/4656-3724-0x000001FB9D870000-0x000001FB9D894000-memory.dmp

                    Filesize

                    144KB

                  • memory/4656-3723-0x000001FB9D870000-0x000001FB9D89A000-memory.dmp

                    Filesize

                    168KB

                  • memory/4832-1343-0x00007FFD5A7B0000-0x00007FFD5B271000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4832-1344-0x00007FFD5A7B0000-0x00007FFD5B271000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4832-1347-0x00007FFD5A7B0000-0x00007FFD5B271000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4832-1332-0x00007FFD5A7B3000-0x00007FFD5A7B5000-memory.dmp

                    Filesize

                    8KB

                  • memory/4832-1333-0x0000021E15AF0000-0x0000021E15B12000-memory.dmp

                    Filesize

                    136KB

                  • memory/5688-3755-0x00007FF71FC70000-0x00007FF7244C3000-memory.dmp

                    Filesize

                    72.3MB

                  • memory/5780-3754-0x00007FF71FC70000-0x00007FF7244C3000-memory.dmp

                    Filesize

                    72.3MB

                  • memory/5984-3757-0x00007FF71FC70000-0x00007FF7244C3000-memory.dmp

                    Filesize

                    72.3MB