Analysis

  • max time kernel
    1791s
  • max time network
    1801s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 07:50

General

  • Target

    ZEHAHAHA.exe

  • Size

    30.4MB

  • MD5

    d3daed0c9c1f809601ea7683b007380c

  • SHA1

    1b46c16855ea23e22c6ec45444241a55bc58cef6

  • SHA256

    2a7bbfcf72ac2ba1d70b42481809113979f2999bedee9ec2a860a3e1c51994b6

  • SHA512

    0da2c32e73132af01096a0f89009e697a6dfb2b30a3a0b740e809accddedefb731a9beebd25a8c21ca363f7be1660f8e90527f64c0397e2c8c9901199cc9b5d8

  • SSDEEP

    786432:e+iIZUW8rm1NddbOzcY8761MZ6deV8v0W5w68gv/FvM+0:I5WqmddCE7tdhW7/K+

Malware Config

Signatures

  • Enumerates VirtualBox DLL files 2 TTPs 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZEHAHAHA.exe
    "C:\Users\Admin\AppData\Local\Temp\ZEHAHAHA.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Users\Admin\AppData\Local\Temp\ZEHAHAHA.exe
      "C:\Users\Admin\AppData\Local\Temp\ZEHAHAHA.exe"
      2⤵
      • Enumerates VirtualBox DLL files
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\PySilon\""
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5032
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\PySilon\activate.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3108
        • C:\Windows\system32\attrib.exe
          attrib +s +h .
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:452
        • C:\Users\Admin\PySilon\test.exe
          "test.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4316
          • C:\Users\Admin\PySilon\test.exe
            "test.exe"
            5⤵
            • Enumerates VirtualBox DLL files
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4368
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\PySilon\""
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:640
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell (Get-CimInstance Win32_ComputerSystemProduct).UUID
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2164
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im "ZEHAHAHA.exe"
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI43162\attrs-24.2.0.dist-info\INSTALLER

    Filesize

    4B

    MD5

    365c9bfeb7d89244f2ce01c1de44cb85

    SHA1

    d7a03141d5d6b1e88b6b59ef08b6681df212c599

    SHA256

    ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

    SHA512

    d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\Crypto\Cipher\_raw_cbc.pyd

    Filesize

    10KB

    MD5

    270fd535f94a87b973874b33f35e5af8

    SHA1

    bb7113a47070b629e878502fc1d929879850856b

    SHA256

    b7ab0516b698a9f4ef50f08ef53af907c83d841d117af16ca742b7e186d3ef51

    SHA512

    829dc409327562736b7d58df6e5e78e8e7595b08fa2c5a993a595032386946ccdf1ef62311c44ffbc31c41165511b40251457a0cf7b92ecec3342850876e5d31

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\Crypto\Cipher\_raw_cfb.pyd

    Filesize

    10KB

    MD5

    778a2ded9a84ad9759141c285e915b11

    SHA1

    2915fb4ca42d79ee32859d67c1299c0e4dfc32e7

    SHA256

    bb6d327d0e42d953a318a7a97953b0e530a0164a610fcab9a098ef9b407ee8a7

    SHA512

    4c3f7945f97a57f74765e064050cfb6a1dd6abcffe1e2a8ce19132709c1dc554562efe188be4357202b6e3ea1998dc75cca4804684b47904547044db5574be67

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\Crypto\Cipher\_raw_ecb.pyd

    Filesize

    9KB

    MD5

    1dfafb0703e7e2a4c69b07dc26e02d6a

    SHA1

    c81d67803d11661b95c5deb3bf67bf012b0042be

    SHA256

    3814206c295e84122211f8d123a2467005acb18e48bf3cc8d673fedd26680313

    SHA512

    816d3b71e3a5f40131073048afbe303fe75ca86a027d5485d06114be05ae2df01242ed9dfafa7c93ca0f8e79a77c20d5257fc7a22bacfff7d9bc60ce7d07bbc4

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\Crypto\Cipher\_raw_ofb.pyd

    Filesize

    10KB

    MD5

    162c4224976c7636cbdffb3bd8a41994

    SHA1

    db24eaad4a68ec9524d21c6ea649da81e401b78e

    SHA256

    1831f1c3857b95a2e6b923cb230b935fe839a64b0dc5aaba5aa92e31a9971551

    SHA512

    a53c4c2fbead0ec2c8c321d4c6edec287b4eb92d5852a1bf373cb1ff76d1e6c9a51443766e4b2a4e612381b373921b8b0d4f4c48c843d2c4272eccd6fda36a9e

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\VCRUNTIME140.dll

    Filesize

    116KB

    MD5

    be8dbe2dc77ebe7f88f910c61aec691a

    SHA1

    a19f08bb2b1c1de5bb61daf9f2304531321e0e40

    SHA256

    4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

    SHA512

    0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\VCRUNTIME140_1.dll

    Filesize

    48KB

    MD5

    f8dfa78045620cf8a732e67d1b1eb53d

    SHA1

    ff9a604d8c99405bfdbbf4295825d3fcbc792704

    SHA256

    a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

    SHA512

    ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_asyncio.pyd

    Filesize

    37KB

    MD5

    b7b1cab9edce355c146141010994a93d

    SHA1

    5d55a40e2adaa9323275828f5053e6ec5baaab0c

    SHA256

    dacaab596eff05ba6b2aadce45d0d59648b73cf25d060dec98695406637caf2d

    SHA512

    e4da70890c1506c6a47bbce5efbdb1149b5ffd1ad0f635750ee8f426bfdba2850465499b27197d1fea718192fc531cc015dc5197bfaca84c15d1f1352b9ad36c

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_bz2.pyd

    Filesize

    48KB

    MD5

    075ae3a74a32bb5386c3524a19e3927e

    SHA1

    8d832da3344e5958358c24d4d31e51f6a8ddfd24

    SHA256

    d581bf9f92031f73ae75e21328597906db970714430e6dc44ce525cf04d5e77a

    SHA512

    455cbe95a369562e56bf76e2c287c52cc5327872151b1797ba3636196dc9231c6d73557d28ee1e3cf2d1c233edb61587cae41498f5d1d8b9cc9c0fdecfff3f1b

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_cffi_backend.cp312-win_amd64.pyd

    Filesize

    71KB

    MD5

    c7f92cfef4af07b6c38ab2cb186f4682

    SHA1

    b6d112dafbcc6693eda269de115236033ecb992d

    SHA256

    326547bdcfc759f83070de22433b8f5460b1563bfef2f375218cc31c814f7cae

    SHA512

    6e321e85778f48e96602e2e502367c5c44ac45c098eed217d19eddc3b3e203ded4012cab85bcad0b42562df1f64076a14598b94257069d53783b572f1f35ae5c

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_ctypes.pyd

    Filesize

    59KB

    MD5

    1a546aaa7d44f48daef4750a679fe22f

    SHA1

    0aaa6657b15c79b3713229e61aec5d0e16e5b404

    SHA256

    b1ed56b8aab1dc0e4021bb08b53ac82fa9bf0c56f171287c55241617dd90bc5b

    SHA512

    338b6210bbde57ac6bbd032f8d65b90fe43d1509c74d138766a50490ee0ff93b5c94ec29fb8b8575f602304a342aa195dfff7b9bc22bb20e78545521ce0cd2e9

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_decimal.pyd

    Filesize

    107KB

    MD5

    0cd50be9ed60afdfaad0497854db6d0d

    SHA1

    b2514e58e5a98ca3c4e70e035810ecd06cb73b1f

    SHA256

    1d68f9a2c700565ff3ae3fc3956cbb8ab4fcf4fdfa7cbfb5a98aa350226505a2

    SHA512

    2896d5704586491105c56ecd34881601f0a65329e8fff9a8082afd406a34d3ebb74f670766f61f5fa70b2e7388d9e2a71625c9d0023af26fb6f91fb36f5d5de6

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_elementtree.pyd

    Filesize

    59KB

    MD5

    7fa4283e02e5df8440e5bab00734daec

    SHA1

    d65be448b03419e12358479a6d9f0204e78f6c7d

    SHA256

    9bef538ecf64b57bdf3b3276708cc05930d402891618b46e73a5c31490f22469

    SHA512

    c37cbea70416798db586c5cac7174b72ab47c90b2740b4b2c49cd875455f2bf5b733f700cf7610b69e7f9de9454860266df6966bfb734a552e1c8f4a2515197b

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_hashlib.pyd

    Filesize

    35KB

    MD5

    c2ac87c77fb85f1c09164b9b854563b2

    SHA1

    f1bf0ef87442db135b19a3f21d37285994315c81

    SHA256

    e8927da7aa0909244eff9b82aec82f2cd597fcab41ba60fd8a08f3cb376dc888

    SHA512

    a40068dbb8a31c443bd0d7f037bb77561782b07e6f49ef8eeefb2cdc35dc58ab0f3b80194f0da26eb42b525ca845891e0aa05a3b4a907622c30cf66583381cef

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_lzma.pyd

    Filesize

    86KB

    MD5

    385a812072bc56d47823360908c2e5ca

    SHA1

    e8f758dfbd6ed8a82d614343116d9e9c164ce021

    SHA256

    4943f6912c4ddd1f6d11fa6ea7f619bf852569efe013558105e7a26518d466fd

    SHA512

    adc6ebda1eb2a51d5bb109c0019150827a3606399f450c250309fce50ae81a820a5a813657e8f4fa6eb7ccc7cb2a5f332aa23db6f12baec156ffc3dd1a32879d

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_multiprocessing.pyd

    Filesize

    27KB

    MD5

    9ff35affc5bb5884357a1638e037550c

    SHA1

    0c23f98b11a609f19de64ae84e8bf457a00ecf20

    SHA256

    fde0d143290783e5c21cb91b9edd2f51513f25c365b70b54857d0d9f50947ed7

    SHA512

    d4ebaca2f9b17ffda750f5cd1e2c6627db38884cd7f6e52ac0496a1e64489b61df56f0344ccb7fa29c547a464315c573314d6038048cb53b46ff6ec3d75495df

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_overlapped.pyd

    Filesize

    33KB

    MD5

    4be51674f1bc4bf44fa85580069b596a

    SHA1

    83c9a8f117319286dbd60fa5be3e0d5137b6b08e

    SHA256

    39768fc9e5b5c7c553d8b67d6529a42835e3dea0bb85dc051ed56d76eaa37d6e

    SHA512

    64e8dfe616fdd785f03657827b156686cafa26b41a8baaa0a78108aeea11dc97d4cc46012bec6140685f476c5f299a928ac26353f246918fcb754558d08c3136

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_queue.pyd

    Filesize

    26KB

    MD5

    ff5aa080771afaf13ba28c249a2a7f31

    SHA1

    18463bba2ac965e51a85724f7cbae09f145d8e75

    SHA256

    088bcabbf20ba558b891c949b29204fc5cad9ada37794a4d81608fade2f68e4d

    SHA512

    9d5bc7806717ce8a04078181433a8a29e0a869ba4310030d16e52f0ef33f8e7374ea571ca764dafc9288e65c672cee11d7a0a66a8ca852ba5d9490330651bd01

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_socket.pyd

    Filesize

    44KB

    MD5

    794b03a9d66e2c20b3c5b6da1e491f03

    SHA1

    11371fd5e491e399386ee9430c1c7c1f087d8034

    SHA256

    9557520c96d984e13500d2a673b342fde071502a418e9f606c6c9bdd83723f80

    SHA512

    c00923b0fdbb8a144a2d2d1a9fa6ec057262082a98de84a088d7cf2fd8c20440f8a8b40eb2c54d6b98cf3f9ae7c07f61aa6cf8c68e208eeb833bc7766c877cf9

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_sqlite3.pyd

    Filesize

    57KB

    MD5

    6a04a1dfa71c5fc80e6561feb2ecf77d

    SHA1

    ad8fa558ea3e10344e48dd94072464d7b6feb908

    SHA256

    7f8ae2ae9acb14285e0bab70d817b3a5ab9ff531484fd18bc2e84ca19c66bb01

    SHA512

    fc95c87f29f6c54a64a26091b03c8ab7328d81298a7f12afbc38d8e7c05c5a0d4d4d7b33ef2c6d94d921772e5a85d2419e5b3356cf25cbdb9fa4a65050b05aeb

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_ssl.pyd

    Filesize

    66KB

    MD5

    b09de65cadc4718032551525b3b4ee84

    SHA1

    c685ab6985bd8ba5e85a1575baa57501e9181329

    SHA256

    d85b9564b554d2daae8ab96e6d08e95c23e4d819e943d76727e21972aae1c5d1

    SHA512

    2f70b8c50d09952163f63e8e84f74b7a91f42f58bec11d20dc663e1b04f62c0ac5ddb6ddd497723fc26c2cf19684d4eea6eb0878bf7f22863582a774cc09de06

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_tkinter.pyd

    Filesize

    38KB

    MD5

    81ccc49a344eb0d332f0b1da9c9f3ddb

    SHA1

    59a8e41a03eec92f65c44e288e32497aebbd8bc6

    SHA256

    7f1acba0744ebbd10d67d6cc4ee1a4e8a67ff6e53c7d663e0a5ef0bc7f0bb90c

    SHA512

    c66d015130e518ef05d7300dff8ad69ec8290a38ffbb5155de539d0b800091f67be7787905ebe7c46ba04d4160aec7825e05fa14e58a517c44083d3f15ce5bb5

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_uuid.pyd

    Filesize

    25KB

    MD5

    8f5402bb6aac9c4ff9b4ce5ac3f0f147

    SHA1

    87207e916d0b01047b311d78649763d6e001c773

    SHA256

    793e44c75e7d746af2bb5176e46c454225f07cb27b1747f1b83d1748d81ad9ac

    SHA512

    65fdef32aeba850aa818a8c8bf794100725a9831b5242350e6c04d0bca075762e1b650f19c437a17b150e9fca6ad344ec4141a041fa12b5a91652361053c7e81

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\_wmi.pyd

    Filesize

    28KB

    MD5

    cedc59ac09061537eb289f769bad7b9e

    SHA1

    5ae74eab2e9d076e2659da9f1295274ad2abd0cb

    SHA256

    48570c1739f9ae4880a73ef8fac1e422b4edde95de68b87bb31eac0256928fa0

    SHA512

    314daab6bb5fdeddb325f9834b8f87027c711371ff1463b74f6ab0ecb92cc5db8934c4775eb0dc7df46dbda5145e00f93cb667aa6e693ae35f4d3c3cf2b52762

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\base_library.zip

    Filesize

    1.3MB

    MD5

    242a4d3404414a9e8ed1ca1a72e8039c

    SHA1

    b1fd68d13cc6d5b97dc3ea8e2be1144ea2c3ed50

    SHA256

    cb98f93ede1f6825699ef6e5f11a65b00cdbc9fdfb34f7209b529a6e43e0402d

    SHA512

    cca8e18cc41300e204aee9e44d68ffe9808679b7dbf3bec9b3885257cadccff1df22a3519cc8db3b3c557653c98bac693bf89a1e6314ef0e0663c76be2bf8626

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\certifi\cacert.pem

    Filesize

    292KB

    MD5

    50ea156b773e8803f6c1fe712f746cba

    SHA1

    2c68212e96605210eddf740291862bdf59398aef

    SHA256

    94edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47

    SHA512

    01ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\charset_normalizer\md.cp312-win_amd64.pyd

    Filesize

    9KB

    MD5

    8ff998858e30924db2d767c23b3348f9

    SHA1

    21fe8cec2c6d71dba898ac4d1bb09ce0f3eac158

    SHA256

    938f973f8b9ca94e8c418fa3d13decb139cf1a69a81666770b745f99e34486eb

    SHA512

    b017f9836d1158f397edc81438aa0de442f63e3371a996cb43d81d6ab0117b5cf2c8fbc9ac36340e6c78670b69fb23fdd60299fd23b0a1a1e769257dc01dca5f

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\charset_normalizer\md__mypyc.cp312-win_amd64.pyd

    Filesize

    39KB

    MD5

    5212fd660452b75fb0cf527c6057a06a

    SHA1

    77239a13ca23b1e5f4f0a04233a5973291c35e3b

    SHA256

    15d0d3d640a30394add6ce767fb48fce2f4a97c83cd673468a6df3d49f2c1ef5

    SHA512

    6e60c7f131c510f373dd89ac84acdb5f43bcc897ceb470c1f6d43a457f06675f8911f22a90fc2c1aa5f4137bda92043b6630f54e3d37ae369cdb00e9c286629c

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\libcrypto-3.dll

    Filesize

    1.6MB

    MD5

    8fed6a2bbb718bb44240a84662c79b53

    SHA1

    2cd169a573922b3a0e35d0f9f252b55638a16bca

    SHA256

    f8de79a5dd7eeb4b2a053315ab4c719cd48fe90b0533949f94b6a291e6bc70fd

    SHA512

    87787593e6a7d0556a4d05f07a276ffdbef551802eb2e4b07104362cb5af0b32bffd911fd9237799e10e0c8685e9e7a7345c3bce2ad966843c269b4c9bd83e03

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\libffi-8.dll

    Filesize

    29KB

    MD5

    013a0b2653aa0eb6075419217a1ed6bd

    SHA1

    1b58ff8e160b29a43397499801cf8ab0344371e7

    SHA256

    e9d8eb01bb9b02ce3859ba4527938a71b4668f98897d46f29e94b27014036523

    SHA512

    0bd13fa1d55133ee2a96387e0756f48133987bacd99d1f58bab3be7bffdf868092060c17ab792dcfbb4680f984f40d3f7cc24abdd657b756496aa8884b8f6099

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\libopus-0.x64.dll

    Filesize

    217KB

    MD5

    e56f1b8c782d39fd19b5c9ade735b51b

    SHA1

    3d1dc7e70a655ba9058958a17efabe76953a00b4

    SHA256

    fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732

    SHA512

    b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\libssl-3.dll

    Filesize

    222KB

    MD5

    37c7f14cd439a0c40d496421343f96d5

    SHA1

    1b6d68159e566f3011087befdcf64f6ee176085c

    SHA256

    b9c8276a3122cacba65cfa78217fef8a6d4f0204548fcacce66018cb91cb1b2a

    SHA512

    f446fd4bd351d391006d82198f7f679718a6e17f14ca5400ba23886275ed5363739bfd5bc01ca07cb2af19668dd8ab0b403bcae139d81a245db2b775770953ea

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\pyexpat.pyd

    Filesize

    88KB

    MD5

    71a72cd213e6756a9915afb34f7b8013

    SHA1

    922e306c60c34137d9428a8fbd98284afebad12f

    SHA256

    80f1db58145dffd83934fa92f858aa9e42cac00e3b1ff6045aeb33a4dcf77cee

    SHA512

    006285b75742bac90a94370016f5796bfbf1a1fc2de8b5c888f738c4667f32ce95f102b37da55662fcecbe3720765aec022afa89eec16e1f1e10b8069b621aa6

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\python3.dll

    Filesize

    66KB

    MD5

    8dbe9bbf7118f4862e02cd2aaf43f1ab

    SHA1

    935bc8c5cea4502d0facf0c49c5f2b9c138608ed

    SHA256

    29f173e0147390a99f541ba0c0231fdd7dfbca84d0e2e561ef352bf1ec72f5db

    SHA512

    938f8387dcc356012ac4a952d371664700b110f7111fcc24f5df7d79791ae95bad0dbaf77d2d6c86c820bfd48a6bdbe8858b7e7ae1a77df88e596556c7135ed4

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\python312.dll

    Filesize

    1.7MB

    MD5

    36e9be7e881d1dc29295bf7599490241

    SHA1

    5b6746aedac80f0e6f16fc88136bcdcbd64b3c65

    SHA256

    ebef43e92267a17f44876c702c914aafa46b997b63223ff46b12149fd2a2616e

    SHA512

    090d4e9092b7fe00180164b6f84b4bd1d1a1e12dc8fea042eaa0e75cc08bb9994c91c3853bedec390208db4ef2e3447cd9be20d7dc20c14e6deb52a141d554cf

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\select.pyd

    Filesize

    25KB

    MD5

    7707f61fa9f5e225de74d55cb1021511

    SHA1

    73ce7161eaaf9e81233f4f034bbbb5ea9c8e438a

    SHA256

    ac639851261f6fe6951481a9fc1ea64e1e97c92910407296c3dbc2d888384944

    SHA512

    5654ffd703a0fad8f953cd59679f6a053ab42e0207a38837a722e3dba65cadbb1fd2a91b344f8596ba7470eb822759b0f6b51a1543b1810c4089444fe3127105

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\sqlite3.dll

    Filesize

    644KB

    MD5

    50d021c2c62240e20f6115929dc8222b

    SHA1

    1fcb9f659de371d476436b77405c92e8ca0be2cb

    SHA256

    326486760609708710de1ff95e6329958caa2bbe45b57e41bb3fb242f3c1207c

    SHA512

    7cf3e2c98aa3d73789ad2ebb96fbab1d54f65972847ad971c77ae7cae7ce86009f0c9100d23f564a45981fa117a43d5746f239afdeafb7b195b7761c5acab19c

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\tcl86t.dll

    Filesize

    652KB

    MD5

    c0e0e8b121c5b9ccc3f5102332bacff1

    SHA1

    2a16f8c6c5143cb70bf249f868d0b71a7b6a2116

    SHA256

    64aadb6388329d7d3387718fdad5d7591b7b091981c60865a44a4f7ec57c2705

    SHA512

    290d538f7906ecf71302ffa65335bc8f9509a25d7e0ea73a9e955e833db539b7810818b663f82aa0cc4703e6f283e3dadc2e3630dd83a204e21dc064c2ebdff1

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\tk86t.dll

    Filesize

    626KB

    MD5

    c33191c40eafd44532eb2d68fa670765

    SHA1

    a44b786d8c716f574d04dfcb0e1c729b68348d60

    SHA256

    ff93ffd200748ad93077a7eb36785e250d3defd283e0dd8182ac80c24c9ea3c6

    SHA512

    a2096685c1516c936c2a2b894c1ebd74e7100aa83710f412b833eb6a4c33cd98f5bf06207c36c6209eafc0084df36e81febf4aaf1e46438fb7985ea9568cd84f

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\unicodedata.pyd

    Filesize

    296KB

    MD5

    7e6ccb19d4f019e0d8dcda1d1b51f481

    SHA1

    b53539c817d6b53f279dc2fbebc210331fc35430

    SHA256

    924def015aa801d088d83380cf02befb38d0aa69bd541f413c07cf40c59b7bde

    SHA512

    27a352da9a883fb5992fde7549d5b38cdf5a271a11426d4a13222dbe0c7219818dac57e65a07ba1b1d6bc49bc03ad194b16200e033194fed04f694dc9377f94e

  • C:\Users\Admin\AppData\Local\Temp\_MEI6922\zlib1.dll

    Filesize

    77KB

    MD5

    b5f27aae57bde847adee4e09e0e552a8

    SHA1

    40ff3042ddf7eda69622ab63ffdcb7c24c481d2d

    SHA256

    2162c3ebc33f00fabff960ee71ded04ad015def1bc9ad84fedd0d2c15c6dabee

    SHA512

    c4322cb56fad9008b043f022752f5011dae616db5950bcf5d9829ba1db7f8ec08527642c1207e9d806f337f1a97480b57f0a562f65ebebe9823710b9a5886179

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1ja0mklt.nqo.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3464-1196-0x00007FFD64B60000-0x00007FFD64B6C000-memory.dmp

    Filesize

    48KB

  • memory/3464-1231-0x00007FFD55280000-0x00007FFD552AF000-memory.dmp

    Filesize

    188KB

  • memory/3464-1168-0x00007FFD55EA0000-0x00007FFD56565000-memory.dmp

    Filesize

    6.8MB

  • memory/3464-1169-0x00007FFD65140000-0x00007FFD6514D000-memory.dmp

    Filesize

    52KB

  • memory/3464-1156-0x00007FFD651A0000-0x00007FFD651B4000-memory.dmp

    Filesize

    80KB

  • memory/3464-1174-0x00007FFD65130000-0x00007FFD6513B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1162-0x00007FFD64F90000-0x00007FFD64FA9000-memory.dmp

    Filesize

    100KB

  • memory/3464-1173-0x00007FFD65210000-0x00007FFD65235000-memory.dmp

    Filesize

    148KB

  • memory/3464-1177-0x00007FFD64B90000-0x00007FFD64BB7000-memory.dmp

    Filesize

    156KB

  • memory/3464-1179-0x00007FFD64620000-0x00007FFD6473A000-memory.dmp

    Filesize

    1.1MB

  • memory/3464-1176-0x00007FFD65EA0000-0x00007FFD65EAF000-memory.dmp

    Filesize

    60KB

  • memory/3464-1163-0x00007FFD652E0000-0x00007FFD652ED000-memory.dmp

    Filesize

    52KB

  • memory/3464-1164-0x00007FFD64C80000-0x00007FFD64CB3000-memory.dmp

    Filesize

    204KB

  • memory/3464-1183-0x00007FFD650E0000-0x00007FFD650EF000-memory.dmp

    Filesize

    60KB

  • memory/3464-1166-0x00007FFD64A30000-0x00007FFD64AFD000-memory.dmp

    Filesize

    820KB

  • memory/3464-1158-0x00007FFD55970000-0x00007FFD55E99000-memory.dmp

    Filesize

    5.2MB

  • memory/3464-1211-0x00007FFD64A20000-0x00007FFD64A2C000-memory.dmp

    Filesize

    48KB

  • memory/3464-1210-0x00007FFD645D0000-0x00007FFD645E6000-memory.dmp

    Filesize

    88KB

  • memory/3464-1214-0x00007FFD64590000-0x00007FFD645A4000-memory.dmp

    Filesize

    80KB

  • memory/3464-1213-0x00007FFD645B0000-0x00007FFD645C2000-memory.dmp

    Filesize

    72KB

  • memory/3464-1212-0x00007FFD64C80000-0x00007FFD64CB3000-memory.dmp

    Filesize

    204KB

  • memory/3464-1209-0x00007FFD645F0000-0x00007FFD645FC000-memory.dmp

    Filesize

    48KB

  • memory/3464-1208-0x00007FFD64600000-0x00007FFD64612000-memory.dmp

    Filesize

    72KB

  • memory/3464-1207-0x00007FFD649D0000-0x00007FFD649DD000-memory.dmp

    Filesize

    52KB

  • memory/3464-1206-0x00007FFD649E0000-0x00007FFD649EB000-memory.dmp

    Filesize

    44KB

  • memory/3464-1205-0x00007FFD649F0000-0x00007FFD649FC000-memory.dmp

    Filesize

    48KB

  • memory/3464-1204-0x00007FFD64A00000-0x00007FFD64A0B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1203-0x00007FFD64A10000-0x00007FFD64A1B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1202-0x00007FFD64B00000-0x00007FFD64B0E000-memory.dmp

    Filesize

    56KB

  • memory/3464-1201-0x00007FFD64B10000-0x00007FFD64B1D000-memory.dmp

    Filesize

    52KB

  • memory/3464-1200-0x00007FFD64B20000-0x00007FFD64B2C000-memory.dmp

    Filesize

    48KB

  • memory/3464-1199-0x00007FFD64B30000-0x00007FFD64B3B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1198-0x00007FFD64B40000-0x00007FFD64B4C000-memory.dmp

    Filesize

    48KB

  • memory/3464-1197-0x00007FFD64B50000-0x00007FFD64B5B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1154-0x00007FFD651C0000-0x00007FFD651ED000-memory.dmp

    Filesize

    180KB

  • memory/3464-1195-0x00007FFD64B70000-0x00007FFD64B7B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1194-0x00007FFD64B80000-0x00007FFD64B8B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1193-0x00007FFD55970000-0x00007FFD55E99000-memory.dmp

    Filesize

    5.2MB

  • memory/3464-1192-0x00007FFD651A0000-0x00007FFD651B4000-memory.dmp

    Filesize

    80KB

  • memory/3464-1123-0x00007FFD65EA0000-0x00007FFD65EAF000-memory.dmp

    Filesize

    60KB

  • memory/3464-1217-0x00007FFD64540000-0x00007FFD6455B000-memory.dmp

    Filesize

    108KB

  • memory/3464-1216-0x00007FFD64560000-0x00007FFD64582000-memory.dmp

    Filesize

    136KB

  • memory/3464-1215-0x00007FFD64A30000-0x00007FFD64AFD000-memory.dmp

    Filesize

    820KB

  • memory/3464-1220-0x00007FFD568E0000-0x00007FFD5692D000-memory.dmp

    Filesize

    308KB

  • memory/3464-1219-0x00007FFD64B90000-0x00007FFD64BB7000-memory.dmp

    Filesize

    156KB

  • memory/3464-1218-0x00007FFD64190000-0x00007FFD641A9000-memory.dmp

    Filesize

    100KB

  • memory/3464-1223-0x00007FFD63780000-0x00007FFD63791000-memory.dmp

    Filesize

    68KB

  • memory/3464-1222-0x00007FFD650E0000-0x00007FFD650EF000-memory.dmp

    Filesize

    60KB

  • memory/3464-1221-0x00007FFD64620000-0x00007FFD6473A000-memory.dmp

    Filesize

    1.1MB

  • memory/3464-1224-0x00007FFD5C010000-0x00007FFD5C042000-memory.dmp

    Filesize

    200KB

  • memory/3464-1225-0x00007FFD5C5C0000-0x00007FFD5C5DE000-memory.dmp

    Filesize

    120KB

  • memory/3464-1226-0x00007FFD552E0000-0x00007FFD5533D000-memory.dmp

    Filesize

    372KB

  • memory/3464-1227-0x00007FFD64590000-0x00007FFD645A4000-memory.dmp

    Filesize

    80KB

  • memory/3464-1229-0x00007FFD552B0000-0x00007FFD552DA000-memory.dmp

    Filesize

    168KB

  • memory/3464-1228-0x00007FFD56E10000-0x00007FFD56E48000-memory.dmp

    Filesize

    224KB

  • memory/3464-1127-0x00007FFD651F0000-0x00007FFD6520A000-memory.dmp

    Filesize

    104KB

  • memory/3464-1230-0x00007FFD64560000-0x00007FFD64582000-memory.dmp

    Filesize

    136KB

  • memory/3464-1233-0x00007FFD55250000-0x00007FFD55274000-memory.dmp

    Filesize

    144KB

  • memory/3464-1232-0x00007FFD64540000-0x00007FFD6455B000-memory.dmp

    Filesize

    108KB

  • memory/3464-1234-0x00007FFD550D0000-0x00007FFD5524F000-memory.dmp

    Filesize

    1.5MB

  • memory/3464-1236-0x00007FFD568C0000-0x00007FFD568D8000-memory.dmp

    Filesize

    96KB

  • memory/3464-1235-0x00007FFD568E0000-0x00007FFD5692D000-memory.dmp

    Filesize

    308KB

  • memory/3464-1242-0x00007FFD5C010000-0x00007FFD5C042000-memory.dmp

    Filesize

    200KB

  • memory/3464-1241-0x00007FFD55090000-0x00007FFD5509C000-memory.dmp

    Filesize

    48KB

  • memory/3464-1240-0x00007FFD550A0000-0x00007FFD550AB000-memory.dmp

    Filesize

    44KB

  • memory/3464-1239-0x00007FFD550B0000-0x00007FFD550BC000-memory.dmp

    Filesize

    48KB

  • memory/3464-1238-0x00007FFD550C0000-0x00007FFD550CB000-memory.dmp

    Filesize

    44KB

  • memory/3464-1237-0x00007FFD61510000-0x00007FFD6151B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1244-0x00007FFD55080000-0x00007FFD5508B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1243-0x00007FFD5C5C0000-0x00007FFD5C5DE000-memory.dmp

    Filesize

    120KB

  • memory/3464-1246-0x00007FFD55070000-0x00007FFD5507C000-memory.dmp

    Filesize

    48KB

  • memory/3464-1245-0x00007FFD552E0000-0x00007FFD5533D000-memory.dmp

    Filesize

    372KB

  • memory/3464-1247-0x00007FFD55060000-0x00007FFD5506D000-memory.dmp

    Filesize

    52KB

  • memory/3464-1249-0x00007FFD55050000-0x00007FFD5505E000-memory.dmp

    Filesize

    56KB

  • memory/3464-1248-0x00007FFD552B0000-0x00007FFD552DA000-memory.dmp

    Filesize

    168KB

  • memory/3464-1261-0x00007FFD54FC0000-0x00007FFD54FCC000-memory.dmp

    Filesize

    48KB

  • memory/3464-1260-0x00007FFD568C0000-0x00007FFD568D8000-memory.dmp

    Filesize

    96KB

  • memory/3464-1259-0x00007FFD55010000-0x00007FFD5501C000-memory.dmp

    Filesize

    48KB

  • memory/3464-1258-0x00007FFD54FD0000-0x00007FFD54FE2000-memory.dmp

    Filesize

    72KB

  • memory/3464-1257-0x00007FFD54FF0000-0x00007FFD54FFD000-memory.dmp

    Filesize

    52KB

  • memory/3464-1256-0x00007FFD55000000-0x00007FFD5500B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1255-0x00007FFD550D0000-0x00007FFD5524F000-memory.dmp

    Filesize

    1.5MB

  • memory/3464-1254-0x00007FFD55020000-0x00007FFD5502B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1253-0x00007FFD55250000-0x00007FFD55274000-memory.dmp

    Filesize

    144KB

  • memory/3464-1252-0x00007FFD55030000-0x00007FFD5503B000-memory.dmp

    Filesize

    44KB

  • memory/3464-1251-0x00007FFD55040000-0x00007FFD5504C000-memory.dmp

    Filesize

    48KB

  • memory/3464-1250-0x00007FFD55280000-0x00007FFD552AF000-memory.dmp

    Filesize

    188KB

  • memory/3464-1262-0x00007FFD54F80000-0x00007FFD54FB6000-memory.dmp

    Filesize

    216KB

  • memory/3464-1263-0x00007FFD54D30000-0x00007FFD54F7A000-memory.dmp

    Filesize

    2.3MB

  • memory/3464-1264-0x00007FFD54530000-0x00007FFD54D2B000-memory.dmp

    Filesize

    8.0MB

  • memory/3464-1265-0x00007FFD544D0000-0x00007FFD54525000-memory.dmp

    Filesize

    340KB

  • memory/3464-1268-0x00007FFD54440000-0x00007FFD54480000-memory.dmp

    Filesize

    256KB

  • memory/3464-1267-0x00007FFD55050000-0x00007FFD5505E000-memory.dmp

    Filesize

    56KB

  • memory/3464-1266-0x00007FFD54480000-0x00007FFD54496000-memory.dmp

    Filesize

    88KB

  • memory/3464-1121-0x00007FFD65210000-0x00007FFD65235000-memory.dmp

    Filesize

    148KB

  • memory/3464-1299-0x00007FFD55EA0000-0x00007FFD56565000-memory.dmp

    Filesize

    6.8MB

  • memory/3464-1340-0x00007FFD5C010000-0x00007FFD5C042000-memory.dmp

    Filesize

    200KB

  • memory/3464-1339-0x00007FFD63780000-0x00007FFD63791000-memory.dmp

    Filesize

    68KB

  • memory/3464-1337-0x00007FFD64190000-0x00007FFD641A9000-memory.dmp

    Filesize

    100KB

  • memory/3464-1335-0x00007FFD64560000-0x00007FFD64582000-memory.dmp

    Filesize

    136KB

  • memory/3464-1334-0x00007FFD64590000-0x00007FFD645A4000-memory.dmp

    Filesize

    80KB

  • memory/3464-1333-0x00007FFD645B0000-0x00007FFD645C2000-memory.dmp

    Filesize

    72KB

  • memory/3464-1314-0x00007FFD650E0000-0x00007FFD650EF000-memory.dmp

    Filesize

    60KB

  • memory/3464-1309-0x00007FFD64A30000-0x00007FFD64AFD000-memory.dmp

    Filesize

    820KB

  • memory/3464-1305-0x00007FFD55970000-0x00007FFD55E99000-memory.dmp

    Filesize

    5.2MB

  • memory/3464-1113-0x00007FFD55EA0000-0x00007FFD56565000-memory.dmp

    Filesize

    6.8MB

  • memory/4368-2667-0x00007FFD64C90000-0x00007FFD64CB5000-memory.dmp

    Filesize

    148KB

  • memory/4368-2681-0x00007FFD64C80000-0x00007FFD64C8F000-memory.dmp

    Filesize

    60KB

  • memory/4368-2677-0x00007FFD652E0000-0x00007FFD652ED000-memory.dmp

    Filesize

    52KB

  • memory/4368-2675-0x00007FFD64A30000-0x00007FFD64A63000-memory.dmp

    Filesize

    204KB

  • memory/4368-2666-0x00007FFD55EA0000-0x00007FFD56565000-memory.dmp

    Filesize

    6.8MB