Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 08:30

General

  • Target

    ZEHAHAHA.exe

  • Size

    30.4MB

  • MD5

    d3daed0c9c1f809601ea7683b007380c

  • SHA1

    1b46c16855ea23e22c6ec45444241a55bc58cef6

  • SHA256

    2a7bbfcf72ac2ba1d70b42481809113979f2999bedee9ec2a860a3e1c51994b6

  • SHA512

    0da2c32e73132af01096a0f89009e697a6dfb2b30a3a0b740e809accddedefb731a9beebd25a8c21ca363f7be1660f8e90527f64c0397e2c8c9901199cc9b5d8

  • SSDEEP

    786432:e+iIZUW8rm1NddbOzcY8761MZ6deV8v0W5w68gv/FvM+0:I5WqmddCE7tdhW7/K+

Malware Config

Signatures

  • Enumerates VirtualBox DLL files 2 TTPs 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZEHAHAHA.exe
    "C:\Users\Admin\AppData\Local\Temp\ZEHAHAHA.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Users\Admin\AppData\Local\Temp\ZEHAHAHA.exe
      "C:\Users\Admin\AppData\Local\Temp\ZEHAHAHA.exe"
      2⤵
      • Enumerates VirtualBox DLL files
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\PySilon\""
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:348
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\PySilon\activate.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Windows\system32\attrib.exe
          attrib +s +h .
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:3628
        • C:\Users\Admin\PySilon\test.exe
          "test.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3684
          • C:\Users\Admin\PySilon\test.exe
            "test.exe"
            5⤵
            • Enumerates VirtualBox DLL files
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2268
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\PySilon\""
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4008
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell (Get-CimInstance Win32_ComputerSystemProduct).UUID
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3932
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im "ZEHAHAHA.exe"
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI36842\attrs-24.2.0.dist-info\INSTALLER

    Filesize

    4B

    MD5

    365c9bfeb7d89244f2ce01c1de44cb85

    SHA1

    d7a03141d5d6b1e88b6b59ef08b6681df212c599

    SHA256

    ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

    SHA512

    d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\Crypto\Cipher\_raw_cbc.pyd

    Filesize

    10KB

    MD5

    270fd535f94a87b973874b33f35e5af8

    SHA1

    bb7113a47070b629e878502fc1d929879850856b

    SHA256

    b7ab0516b698a9f4ef50f08ef53af907c83d841d117af16ca742b7e186d3ef51

    SHA512

    829dc409327562736b7d58df6e5e78e8e7595b08fa2c5a993a595032386946ccdf1ef62311c44ffbc31c41165511b40251457a0cf7b92ecec3342850876e5d31

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\Crypto\Cipher\_raw_cfb.pyd

    Filesize

    10KB

    MD5

    778a2ded9a84ad9759141c285e915b11

    SHA1

    2915fb4ca42d79ee32859d67c1299c0e4dfc32e7

    SHA256

    bb6d327d0e42d953a318a7a97953b0e530a0164a610fcab9a098ef9b407ee8a7

    SHA512

    4c3f7945f97a57f74765e064050cfb6a1dd6abcffe1e2a8ce19132709c1dc554562efe188be4357202b6e3ea1998dc75cca4804684b47904547044db5574be67

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\Crypto\Cipher\_raw_ecb.pyd

    Filesize

    9KB

    MD5

    1dfafb0703e7e2a4c69b07dc26e02d6a

    SHA1

    c81d67803d11661b95c5deb3bf67bf012b0042be

    SHA256

    3814206c295e84122211f8d123a2467005acb18e48bf3cc8d673fedd26680313

    SHA512

    816d3b71e3a5f40131073048afbe303fe75ca86a027d5485d06114be05ae2df01242ed9dfafa7c93ca0f8e79a77c20d5257fc7a22bacfff7d9bc60ce7d07bbc4

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\Crypto\Cipher\_raw_ofb.pyd

    Filesize

    10KB

    MD5

    162c4224976c7636cbdffb3bd8a41994

    SHA1

    db24eaad4a68ec9524d21c6ea649da81e401b78e

    SHA256

    1831f1c3857b95a2e6b923cb230b935fe839a64b0dc5aaba5aa92e31a9971551

    SHA512

    a53c4c2fbead0ec2c8c321d4c6edec287b4eb92d5852a1bf373cb1ff76d1e6c9a51443766e4b2a4e612381b373921b8b0d4f4c48c843d2c4272eccd6fda36a9e

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\VCRUNTIME140.dll

    Filesize

    116KB

    MD5

    be8dbe2dc77ebe7f88f910c61aec691a

    SHA1

    a19f08bb2b1c1de5bb61daf9f2304531321e0e40

    SHA256

    4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

    SHA512

    0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\VCRUNTIME140_1.dll

    Filesize

    48KB

    MD5

    f8dfa78045620cf8a732e67d1b1eb53d

    SHA1

    ff9a604d8c99405bfdbbf4295825d3fcbc792704

    SHA256

    a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

    SHA512

    ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_asyncio.pyd

    Filesize

    37KB

    MD5

    b7b1cab9edce355c146141010994a93d

    SHA1

    5d55a40e2adaa9323275828f5053e6ec5baaab0c

    SHA256

    dacaab596eff05ba6b2aadce45d0d59648b73cf25d060dec98695406637caf2d

    SHA512

    e4da70890c1506c6a47bbce5efbdb1149b5ffd1ad0f635750ee8f426bfdba2850465499b27197d1fea718192fc531cc015dc5197bfaca84c15d1f1352b9ad36c

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_bz2.pyd

    Filesize

    48KB

    MD5

    075ae3a74a32bb5386c3524a19e3927e

    SHA1

    8d832da3344e5958358c24d4d31e51f6a8ddfd24

    SHA256

    d581bf9f92031f73ae75e21328597906db970714430e6dc44ce525cf04d5e77a

    SHA512

    455cbe95a369562e56bf76e2c287c52cc5327872151b1797ba3636196dc9231c6d73557d28ee1e3cf2d1c233edb61587cae41498f5d1d8b9cc9c0fdecfff3f1b

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_cffi_backend.cp312-win_amd64.pyd

    Filesize

    71KB

    MD5

    c7f92cfef4af07b6c38ab2cb186f4682

    SHA1

    b6d112dafbcc6693eda269de115236033ecb992d

    SHA256

    326547bdcfc759f83070de22433b8f5460b1563bfef2f375218cc31c814f7cae

    SHA512

    6e321e85778f48e96602e2e502367c5c44ac45c098eed217d19eddc3b3e203ded4012cab85bcad0b42562df1f64076a14598b94257069d53783b572f1f35ae5c

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_ctypes.pyd

    Filesize

    59KB

    MD5

    1a546aaa7d44f48daef4750a679fe22f

    SHA1

    0aaa6657b15c79b3713229e61aec5d0e16e5b404

    SHA256

    b1ed56b8aab1dc0e4021bb08b53ac82fa9bf0c56f171287c55241617dd90bc5b

    SHA512

    338b6210bbde57ac6bbd032f8d65b90fe43d1509c74d138766a50490ee0ff93b5c94ec29fb8b8575f602304a342aa195dfff7b9bc22bb20e78545521ce0cd2e9

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_decimal.pyd

    Filesize

    107KB

    MD5

    0cd50be9ed60afdfaad0497854db6d0d

    SHA1

    b2514e58e5a98ca3c4e70e035810ecd06cb73b1f

    SHA256

    1d68f9a2c700565ff3ae3fc3956cbb8ab4fcf4fdfa7cbfb5a98aa350226505a2

    SHA512

    2896d5704586491105c56ecd34881601f0a65329e8fff9a8082afd406a34d3ebb74f670766f61f5fa70b2e7388d9e2a71625c9d0023af26fb6f91fb36f5d5de6

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_elementtree.pyd

    Filesize

    59KB

    MD5

    7fa4283e02e5df8440e5bab00734daec

    SHA1

    d65be448b03419e12358479a6d9f0204e78f6c7d

    SHA256

    9bef538ecf64b57bdf3b3276708cc05930d402891618b46e73a5c31490f22469

    SHA512

    c37cbea70416798db586c5cac7174b72ab47c90b2740b4b2c49cd875455f2bf5b733f700cf7610b69e7f9de9454860266df6966bfb734a552e1c8f4a2515197b

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_hashlib.pyd

    Filesize

    35KB

    MD5

    c2ac87c77fb85f1c09164b9b854563b2

    SHA1

    f1bf0ef87442db135b19a3f21d37285994315c81

    SHA256

    e8927da7aa0909244eff9b82aec82f2cd597fcab41ba60fd8a08f3cb376dc888

    SHA512

    a40068dbb8a31c443bd0d7f037bb77561782b07e6f49ef8eeefb2cdc35dc58ab0f3b80194f0da26eb42b525ca845891e0aa05a3b4a907622c30cf66583381cef

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_lzma.pyd

    Filesize

    86KB

    MD5

    385a812072bc56d47823360908c2e5ca

    SHA1

    e8f758dfbd6ed8a82d614343116d9e9c164ce021

    SHA256

    4943f6912c4ddd1f6d11fa6ea7f619bf852569efe013558105e7a26518d466fd

    SHA512

    adc6ebda1eb2a51d5bb109c0019150827a3606399f450c250309fce50ae81a820a5a813657e8f4fa6eb7ccc7cb2a5f332aa23db6f12baec156ffc3dd1a32879d

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_multiprocessing.pyd

    Filesize

    27KB

    MD5

    9ff35affc5bb5884357a1638e037550c

    SHA1

    0c23f98b11a609f19de64ae84e8bf457a00ecf20

    SHA256

    fde0d143290783e5c21cb91b9edd2f51513f25c365b70b54857d0d9f50947ed7

    SHA512

    d4ebaca2f9b17ffda750f5cd1e2c6627db38884cd7f6e52ac0496a1e64489b61df56f0344ccb7fa29c547a464315c573314d6038048cb53b46ff6ec3d75495df

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_overlapped.pyd

    Filesize

    33KB

    MD5

    4be51674f1bc4bf44fa85580069b596a

    SHA1

    83c9a8f117319286dbd60fa5be3e0d5137b6b08e

    SHA256

    39768fc9e5b5c7c553d8b67d6529a42835e3dea0bb85dc051ed56d76eaa37d6e

    SHA512

    64e8dfe616fdd785f03657827b156686cafa26b41a8baaa0a78108aeea11dc97d4cc46012bec6140685f476c5f299a928ac26353f246918fcb754558d08c3136

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_queue.pyd

    Filesize

    26KB

    MD5

    ff5aa080771afaf13ba28c249a2a7f31

    SHA1

    18463bba2ac965e51a85724f7cbae09f145d8e75

    SHA256

    088bcabbf20ba558b891c949b29204fc5cad9ada37794a4d81608fade2f68e4d

    SHA512

    9d5bc7806717ce8a04078181433a8a29e0a869ba4310030d16e52f0ef33f8e7374ea571ca764dafc9288e65c672cee11d7a0a66a8ca852ba5d9490330651bd01

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_socket.pyd

    Filesize

    44KB

    MD5

    794b03a9d66e2c20b3c5b6da1e491f03

    SHA1

    11371fd5e491e399386ee9430c1c7c1f087d8034

    SHA256

    9557520c96d984e13500d2a673b342fde071502a418e9f606c6c9bdd83723f80

    SHA512

    c00923b0fdbb8a144a2d2d1a9fa6ec057262082a98de84a088d7cf2fd8c20440f8a8b40eb2c54d6b98cf3f9ae7c07f61aa6cf8c68e208eeb833bc7766c877cf9

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_sqlite3.pyd

    Filesize

    57KB

    MD5

    6a04a1dfa71c5fc80e6561feb2ecf77d

    SHA1

    ad8fa558ea3e10344e48dd94072464d7b6feb908

    SHA256

    7f8ae2ae9acb14285e0bab70d817b3a5ab9ff531484fd18bc2e84ca19c66bb01

    SHA512

    fc95c87f29f6c54a64a26091b03c8ab7328d81298a7f12afbc38d8e7c05c5a0d4d4d7b33ef2c6d94d921772e5a85d2419e5b3356cf25cbdb9fa4a65050b05aeb

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_ssl.pyd

    Filesize

    66KB

    MD5

    b09de65cadc4718032551525b3b4ee84

    SHA1

    c685ab6985bd8ba5e85a1575baa57501e9181329

    SHA256

    d85b9564b554d2daae8ab96e6d08e95c23e4d819e943d76727e21972aae1c5d1

    SHA512

    2f70b8c50d09952163f63e8e84f74b7a91f42f58bec11d20dc663e1b04f62c0ac5ddb6ddd497723fc26c2cf19684d4eea6eb0878bf7f22863582a774cc09de06

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_tkinter.pyd

    Filesize

    38KB

    MD5

    81ccc49a344eb0d332f0b1da9c9f3ddb

    SHA1

    59a8e41a03eec92f65c44e288e32497aebbd8bc6

    SHA256

    7f1acba0744ebbd10d67d6cc4ee1a4e8a67ff6e53c7d663e0a5ef0bc7f0bb90c

    SHA512

    c66d015130e518ef05d7300dff8ad69ec8290a38ffbb5155de539d0b800091f67be7787905ebe7c46ba04d4160aec7825e05fa14e58a517c44083d3f15ce5bb5

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_uuid.pyd

    Filesize

    25KB

    MD5

    8f5402bb6aac9c4ff9b4ce5ac3f0f147

    SHA1

    87207e916d0b01047b311d78649763d6e001c773

    SHA256

    793e44c75e7d746af2bb5176e46c454225f07cb27b1747f1b83d1748d81ad9ac

    SHA512

    65fdef32aeba850aa818a8c8bf794100725a9831b5242350e6c04d0bca075762e1b650f19c437a17b150e9fca6ad344ec4141a041fa12b5a91652361053c7e81

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\_wmi.pyd

    Filesize

    28KB

    MD5

    cedc59ac09061537eb289f769bad7b9e

    SHA1

    5ae74eab2e9d076e2659da9f1295274ad2abd0cb

    SHA256

    48570c1739f9ae4880a73ef8fac1e422b4edde95de68b87bb31eac0256928fa0

    SHA512

    314daab6bb5fdeddb325f9834b8f87027c711371ff1463b74f6ab0ecb92cc5db8934c4775eb0dc7df46dbda5145e00f93cb667aa6e693ae35f4d3c3cf2b52762

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\base_library.zip

    Filesize

    1.3MB

    MD5

    242a4d3404414a9e8ed1ca1a72e8039c

    SHA1

    b1fd68d13cc6d5b97dc3ea8e2be1144ea2c3ed50

    SHA256

    cb98f93ede1f6825699ef6e5f11a65b00cdbc9fdfb34f7209b529a6e43e0402d

    SHA512

    cca8e18cc41300e204aee9e44d68ffe9808679b7dbf3bec9b3885257cadccff1df22a3519cc8db3b3c557653c98bac693bf89a1e6314ef0e0663c76be2bf8626

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\certifi\cacert.pem

    Filesize

    292KB

    MD5

    50ea156b773e8803f6c1fe712f746cba

    SHA1

    2c68212e96605210eddf740291862bdf59398aef

    SHA256

    94edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47

    SHA512

    01ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\charset_normalizer\md.cp312-win_amd64.pyd

    Filesize

    9KB

    MD5

    8ff998858e30924db2d767c23b3348f9

    SHA1

    21fe8cec2c6d71dba898ac4d1bb09ce0f3eac158

    SHA256

    938f973f8b9ca94e8c418fa3d13decb139cf1a69a81666770b745f99e34486eb

    SHA512

    b017f9836d1158f397edc81438aa0de442f63e3371a996cb43d81d6ab0117b5cf2c8fbc9ac36340e6c78670b69fb23fdd60299fd23b0a1a1e769257dc01dca5f

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\charset_normalizer\md__mypyc.cp312-win_amd64.pyd

    Filesize

    39KB

    MD5

    5212fd660452b75fb0cf527c6057a06a

    SHA1

    77239a13ca23b1e5f4f0a04233a5973291c35e3b

    SHA256

    15d0d3d640a30394add6ce767fb48fce2f4a97c83cd673468a6df3d49f2c1ef5

    SHA512

    6e60c7f131c510f373dd89ac84acdb5f43bcc897ceb470c1f6d43a457f06675f8911f22a90fc2c1aa5f4137bda92043b6630f54e3d37ae369cdb00e9c286629c

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\libcrypto-3.dll

    Filesize

    1.6MB

    MD5

    8fed6a2bbb718bb44240a84662c79b53

    SHA1

    2cd169a573922b3a0e35d0f9f252b55638a16bca

    SHA256

    f8de79a5dd7eeb4b2a053315ab4c719cd48fe90b0533949f94b6a291e6bc70fd

    SHA512

    87787593e6a7d0556a4d05f07a276ffdbef551802eb2e4b07104362cb5af0b32bffd911fd9237799e10e0c8685e9e7a7345c3bce2ad966843c269b4c9bd83e03

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\libffi-8.dll

    Filesize

    29KB

    MD5

    013a0b2653aa0eb6075419217a1ed6bd

    SHA1

    1b58ff8e160b29a43397499801cf8ab0344371e7

    SHA256

    e9d8eb01bb9b02ce3859ba4527938a71b4668f98897d46f29e94b27014036523

    SHA512

    0bd13fa1d55133ee2a96387e0756f48133987bacd99d1f58bab3be7bffdf868092060c17ab792dcfbb4680f984f40d3f7cc24abdd657b756496aa8884b8f6099

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\libopus-0.x64.dll

    Filesize

    217KB

    MD5

    e56f1b8c782d39fd19b5c9ade735b51b

    SHA1

    3d1dc7e70a655ba9058958a17efabe76953a00b4

    SHA256

    fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732

    SHA512

    b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\libssl-3.dll

    Filesize

    222KB

    MD5

    37c7f14cd439a0c40d496421343f96d5

    SHA1

    1b6d68159e566f3011087befdcf64f6ee176085c

    SHA256

    b9c8276a3122cacba65cfa78217fef8a6d4f0204548fcacce66018cb91cb1b2a

    SHA512

    f446fd4bd351d391006d82198f7f679718a6e17f14ca5400ba23886275ed5363739bfd5bc01ca07cb2af19668dd8ab0b403bcae139d81a245db2b775770953ea

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\pyexpat.pyd

    Filesize

    88KB

    MD5

    71a72cd213e6756a9915afb34f7b8013

    SHA1

    922e306c60c34137d9428a8fbd98284afebad12f

    SHA256

    80f1db58145dffd83934fa92f858aa9e42cac00e3b1ff6045aeb33a4dcf77cee

    SHA512

    006285b75742bac90a94370016f5796bfbf1a1fc2de8b5c888f738c4667f32ce95f102b37da55662fcecbe3720765aec022afa89eec16e1f1e10b8069b621aa6

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\python3.DLL

    Filesize

    66KB

    MD5

    8dbe9bbf7118f4862e02cd2aaf43f1ab

    SHA1

    935bc8c5cea4502d0facf0c49c5f2b9c138608ed

    SHA256

    29f173e0147390a99f541ba0c0231fdd7dfbca84d0e2e561ef352bf1ec72f5db

    SHA512

    938f8387dcc356012ac4a952d371664700b110f7111fcc24f5df7d79791ae95bad0dbaf77d2d6c86c820bfd48a6bdbe8858b7e7ae1a77df88e596556c7135ed4

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\python312.dll

    Filesize

    1.7MB

    MD5

    36e9be7e881d1dc29295bf7599490241

    SHA1

    5b6746aedac80f0e6f16fc88136bcdcbd64b3c65

    SHA256

    ebef43e92267a17f44876c702c914aafa46b997b63223ff46b12149fd2a2616e

    SHA512

    090d4e9092b7fe00180164b6f84b4bd1d1a1e12dc8fea042eaa0e75cc08bb9994c91c3853bedec390208db4ef2e3447cd9be20d7dc20c14e6deb52a141d554cf

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\select.pyd

    Filesize

    25KB

    MD5

    7707f61fa9f5e225de74d55cb1021511

    SHA1

    73ce7161eaaf9e81233f4f034bbbb5ea9c8e438a

    SHA256

    ac639851261f6fe6951481a9fc1ea64e1e97c92910407296c3dbc2d888384944

    SHA512

    5654ffd703a0fad8f953cd59679f6a053ab42e0207a38837a722e3dba65cadbb1fd2a91b344f8596ba7470eb822759b0f6b51a1543b1810c4089444fe3127105

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\sqlite3.dll

    Filesize

    644KB

    MD5

    50d021c2c62240e20f6115929dc8222b

    SHA1

    1fcb9f659de371d476436b77405c92e8ca0be2cb

    SHA256

    326486760609708710de1ff95e6329958caa2bbe45b57e41bb3fb242f3c1207c

    SHA512

    7cf3e2c98aa3d73789ad2ebb96fbab1d54f65972847ad971c77ae7cae7ce86009f0c9100d23f564a45981fa117a43d5746f239afdeafb7b195b7761c5acab19c

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\tcl86t.dll

    Filesize

    652KB

    MD5

    c0e0e8b121c5b9ccc3f5102332bacff1

    SHA1

    2a16f8c6c5143cb70bf249f868d0b71a7b6a2116

    SHA256

    64aadb6388329d7d3387718fdad5d7591b7b091981c60865a44a4f7ec57c2705

    SHA512

    290d538f7906ecf71302ffa65335bc8f9509a25d7e0ea73a9e955e833db539b7810818b663f82aa0cc4703e6f283e3dadc2e3630dd83a204e21dc064c2ebdff1

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\tk86t.dll

    Filesize

    626KB

    MD5

    c33191c40eafd44532eb2d68fa670765

    SHA1

    a44b786d8c716f574d04dfcb0e1c729b68348d60

    SHA256

    ff93ffd200748ad93077a7eb36785e250d3defd283e0dd8182ac80c24c9ea3c6

    SHA512

    a2096685c1516c936c2a2b894c1ebd74e7100aa83710f412b833eb6a4c33cd98f5bf06207c36c6209eafc0084df36e81febf4aaf1e46438fb7985ea9568cd84f

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\unicodedata.pyd

    Filesize

    296KB

    MD5

    7e6ccb19d4f019e0d8dcda1d1b51f481

    SHA1

    b53539c817d6b53f279dc2fbebc210331fc35430

    SHA256

    924def015aa801d088d83380cf02befb38d0aa69bd541f413c07cf40c59b7bde

    SHA512

    27a352da9a883fb5992fde7549d5b38cdf5a271a11426d4a13222dbe0c7219818dac57e65a07ba1b1d6bc49bc03ad194b16200e033194fed04f694dc9377f94e

  • C:\Users\Admin\AppData\Local\Temp\_MEI7402\zlib1.dll

    Filesize

    77KB

    MD5

    b5f27aae57bde847adee4e09e0e552a8

    SHA1

    40ff3042ddf7eda69622ab63ffdcb7c24c481d2d

    SHA256

    2162c3ebc33f00fabff960ee71ded04ad015def1bc9ad84fedd0d2c15c6dabee

    SHA512

    c4322cb56fad9008b043f022752f5011dae616db5950bcf5d9829ba1db7f8ec08527642c1207e9d806f337f1a97480b57f0a562f65ebebe9823710b9a5886179

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j0bocdio.r4e.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2268-2827-0x00007FFE867B0000-0x00007FFE867D5000-memory.dmp

    Filesize

    148KB

  • memory/2268-2837-0x00007FFE89900000-0x00007FFE8990D000-memory.dmp

    Filesize

    52KB

  • memory/2268-2835-0x00007FFE86580000-0x00007FFE865B3000-memory.dmp

    Filesize

    204KB

  • memory/2268-2832-0x00007FFE761A0000-0x00007FFE766C9000-memory.dmp

    Filesize

    5.2MB

  • memory/2268-2826-0x00007FFE766D0000-0x00007FFE76D95000-memory.dmp

    Filesize

    6.8MB

  • memory/4928-1229-0x00007FFE808F0000-0x00007FFE80909000-memory.dmp

    Filesize

    100KB

  • memory/4928-1256-0x00007FFE75DA0000-0x00007FFE75DB2000-memory.dmp

    Filesize

    72KB

  • memory/4928-1194-0x00007FFE86440000-0x00007FFE8644B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1193-0x00007FFE86450000-0x00007FFE8645C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1192-0x00007FFE86460000-0x00007FFE8646B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1191-0x00007FFE86470000-0x00007FFE8647B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1158-0x00007FFE76150000-0x00007FFE76679000-memory.dmp

    Filesize

    5.2MB

  • memory/4928-1200-0x00007FFE863F0000-0x00007FFE863FE000-memory.dmp

    Filesize

    56KB

  • memory/4928-1209-0x00007FFE86410000-0x00007FFE8641C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1208-0x00007FFE85790000-0x00007FFE8579C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1198-0x00007FFE86420000-0x00007FFE8642B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1207-0x00007FFE857A0000-0x00007FFE857B2000-memory.dmp

    Filesize

    72KB

  • memory/4928-1211-0x00007FFE85350000-0x00007FFE85366000-memory.dmp

    Filesize

    88KB

  • memory/4928-1213-0x00007FFE818A0000-0x00007FFE818B4000-memory.dmp

    Filesize

    80KB

  • memory/4928-1212-0x00007FFE829B0000-0x00007FFE829C2000-memory.dmp

    Filesize

    72KB

  • memory/4928-1214-0x00007FFE81870000-0x00007FFE81892000-memory.dmp

    Filesize

    136KB

  • memory/4928-1216-0x00007FFE80B50000-0x00007FFE80B6B000-memory.dmp

    Filesize

    108KB

  • memory/4928-1215-0x00007FFE86490000-0x00007FFE8649F000-memory.dmp

    Filesize

    60KB

  • memory/4928-1210-0x00007FFE86580000-0x00007FFE865B3000-memory.dmp

    Filesize

    204KB

  • memory/4928-1206-0x00007FFE85AB0000-0x00007FFE85ABD000-memory.dmp

    Filesize

    52KB

  • memory/4928-1205-0x00007FFE85F50000-0x00007FFE85F5B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1204-0x00007FFE86090000-0x00007FFE8609C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1203-0x00007FFE86230000-0x00007FFE8623B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1202-0x00007FFE86240000-0x00007FFE8624B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1201-0x00007FFE86250000-0x00007FFE8625C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1199-0x00007FFE86400000-0x00007FFE8640D000-memory.dmp

    Filesize

    52KB

  • memory/4928-1197-0x00007FFE76150000-0x00007FFE76679000-memory.dmp

    Filesize

    5.2MB

  • memory/4928-1156-0x00007FFE899D0000-0x00007FFE899E4000-memory.dmp

    Filesize

    80KB

  • memory/4928-1182-0x00007FFE86490000-0x00007FFE8649F000-memory.dmp

    Filesize

    60KB

  • memory/4928-1196-0x00007FFE86430000-0x00007FFE8643C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1154-0x00007FFE865E0000-0x00007FFE8660D000-memory.dmp

    Filesize

    180KB

  • memory/4928-1164-0x00007FFE86580000-0x00007FFE865B3000-memory.dmp

    Filesize

    204KB

  • memory/4928-1179-0x00007FFE89900000-0x00007FFE8990D000-memory.dmp

    Filesize

    52KB

  • memory/4928-1127-0x00007FFE8BAC0000-0x00007FFE8BADA000-memory.dmp

    Filesize

    104KB

  • memory/4928-1123-0x00007FFE8EBE0000-0x00007FFE8EBEF000-memory.dmp

    Filesize

    60KB

  • memory/4928-1217-0x00007FFE808F0000-0x00007FFE80909000-memory.dmp

    Filesize

    100KB

  • memory/4928-1122-0x00007FFE867B0000-0x00007FFE867D5000-memory.dmp

    Filesize

    148KB

  • memory/4928-1178-0x00007FFE76030000-0x00007FFE7614A000-memory.dmp

    Filesize

    1.1MB

  • memory/4928-1218-0x00007FFE80620000-0x00007FFE8066D000-memory.dmp

    Filesize

    308KB

  • memory/4928-1219-0x00007FFE808D0000-0x00007FFE808E1000-memory.dmp

    Filesize

    68KB

  • memory/4928-1220-0x00007FFE805E0000-0x00007FFE80612000-memory.dmp

    Filesize

    200KB

  • memory/4928-1221-0x00007FFE7CA10000-0x00007FFE7CA2E000-memory.dmp

    Filesize

    120KB

  • memory/4928-1222-0x00007FFE77740000-0x00007FFE7779D000-memory.dmp

    Filesize

    372KB

  • memory/4928-1223-0x00007FFE77190000-0x00007FFE771C8000-memory.dmp

    Filesize

    224KB

  • memory/4928-1226-0x00007FFE77130000-0x00007FFE7715F000-memory.dmp

    Filesize

    188KB

  • memory/4928-1225-0x00007FFE81870000-0x00007FFE81892000-memory.dmp

    Filesize

    136KB

  • memory/4928-1228-0x00007FFE77100000-0x00007FFE77124000-memory.dmp

    Filesize

    144KB

  • memory/4928-1227-0x00007FFE80B50000-0x00007FFE80B6B000-memory.dmp

    Filesize

    108KB

  • memory/4928-1160-0x00007FFE865C0000-0x00007FFE865D9000-memory.dmp

    Filesize

    100KB

  • memory/4928-1224-0x00007FFE77160000-0x00007FFE7718A000-memory.dmp

    Filesize

    168KB

  • memory/4928-1230-0x00007FFE76F80000-0x00007FFE770FF000-memory.dmp

    Filesize

    1.5MB

  • memory/4928-1232-0x00007FFE774B0000-0x00007FFE774C8000-memory.dmp

    Filesize

    96KB

  • memory/4928-1231-0x00007FFE80620000-0x00007FFE8066D000-memory.dmp

    Filesize

    308KB

  • memory/4928-1239-0x00007FFE76D90000-0x00007FFE76D9B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1252-0x00007FFE75DD0000-0x00007FFE75DDB000-memory.dmp

    Filesize

    44KB

  • memory/4928-1258-0x00007FFE75B60000-0x00007FFE75B96000-memory.dmp

    Filesize

    216KB

  • memory/4928-1257-0x00007FFE75D90000-0x00007FFE75D9C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1195-0x00007FFE899D0000-0x00007FFE899E4000-memory.dmp

    Filesize

    80KB

  • memory/4928-1255-0x00007FFE75DC0000-0x00007FFE75DCD000-memory.dmp

    Filesize

    52KB

  • memory/4928-1254-0x00007FFE76F80000-0x00007FFE770FF000-memory.dmp

    Filesize

    1.5MB

  • memory/4928-1253-0x00007FFE77100000-0x00007FFE77124000-memory.dmp

    Filesize

    144KB

  • memory/4928-1251-0x00007FFE77130000-0x00007FFE7715F000-memory.dmp

    Filesize

    188KB

  • memory/4928-1250-0x00007FFE77160000-0x00007FFE7718A000-memory.dmp

    Filesize

    168KB

  • memory/4928-1249-0x00007FFE75DE0000-0x00007FFE75DEC000-memory.dmp

    Filesize

    48KB

  • memory/4928-1248-0x00007FFE75DF0000-0x00007FFE75DFB000-memory.dmp

    Filesize

    44KB

  • memory/4928-1247-0x00007FFE75E00000-0x00007FFE75E0B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1246-0x00007FFE75E10000-0x00007FFE75E1C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1245-0x00007FFE75E20000-0x00007FFE75E2E000-memory.dmp

    Filesize

    56KB

  • memory/4928-1244-0x00007FFE76D50000-0x00007FFE76D5D000-memory.dmp

    Filesize

    52KB

  • memory/4928-1243-0x00007FFE76D60000-0x00007FFE76D6C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1242-0x00007FFE76D70000-0x00007FFE76D7B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1241-0x00007FFE76D80000-0x00007FFE76D8C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1240-0x00007FFE77740000-0x00007FFE7779D000-memory.dmp

    Filesize

    372KB

  • memory/4928-1238-0x00007FFE7CA10000-0x00007FFE7CA2E000-memory.dmp

    Filesize

    120KB

  • memory/4928-1237-0x00007FFE77730000-0x00007FFE7773C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1236-0x00007FFE805E0000-0x00007FFE80612000-memory.dmp

    Filesize

    200KB

  • memory/4928-1235-0x00007FFE800B0000-0x00007FFE800BB000-memory.dmp

    Filesize

    44KB

  • memory/4928-1234-0x00007FFE80590000-0x00007FFE8059B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1233-0x00007FFE808D0000-0x00007FFE808E1000-memory.dmp

    Filesize

    68KB

  • memory/4928-1259-0x00007FFE758C0000-0x00007FFE75B0A000-memory.dmp

    Filesize

    2.3MB

  • memory/4928-1260-0x00007FFE750C0000-0x00007FFE758BB000-memory.dmp

    Filesize

    8.0MB

  • memory/4928-1263-0x00007FFE75010000-0x00007FFE75026000-memory.dmp

    Filesize

    88KB

  • memory/4928-1262-0x00007FFE76D90000-0x00007FFE76D9B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1261-0x00007FFE75060000-0x00007FFE750B5000-memory.dmp

    Filesize

    340KB

  • memory/4928-1264-0x00007FFE74FD0000-0x00007FFE75010000-memory.dmp

    Filesize

    256KB

  • memory/4928-1268-0x00007FFE74BD0000-0x00007FFE74D9A000-memory.dmp

    Filesize

    1.8MB

  • memory/4928-1267-0x00007FFE75DE0000-0x00007FFE75DEC000-memory.dmp

    Filesize

    48KB

  • memory/4928-1266-0x00007FFE746B0000-0x00007FFE746DE000-memory.dmp

    Filesize

    184KB

  • memory/4928-1265-0x00007FFE74DE0000-0x00007FFE74DF6000-memory.dmp

    Filesize

    88KB

  • memory/4928-1177-0x00007FFE86550000-0x00007FFE86577000-memory.dmp

    Filesize

    156KB

  • memory/4928-1326-0x00007FFE85AB0000-0x00007FFE85ABD000-memory.dmp

    Filesize

    52KB

  • memory/4928-1337-0x00007FFE805E0000-0x00007FFE80612000-memory.dmp

    Filesize

    200KB

  • memory/4928-1336-0x00007FFE808D0000-0x00007FFE808E1000-memory.dmp

    Filesize

    68KB

  • memory/4928-1335-0x00007FFE80620000-0x00007FFE8066D000-memory.dmp

    Filesize

    308KB

  • memory/4928-1334-0x00007FFE808F0000-0x00007FFE80909000-memory.dmp

    Filesize

    100KB

  • memory/4928-1333-0x00007FFE80B50000-0x00007FFE80B6B000-memory.dmp

    Filesize

    108KB

  • memory/4928-1332-0x00007FFE81870000-0x00007FFE81892000-memory.dmp

    Filesize

    136KB

  • memory/4928-1330-0x00007FFE829B0000-0x00007FFE829C2000-memory.dmp

    Filesize

    72KB

  • memory/4928-1329-0x00007FFE85350000-0x00007FFE85366000-memory.dmp

    Filesize

    88KB

  • memory/4928-1328-0x00007FFE85790000-0x00007FFE8579C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1327-0x00007FFE857A0000-0x00007FFE857B2000-memory.dmp

    Filesize

    72KB

  • memory/4928-1324-0x00007FFE86090000-0x00007FFE8609C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1323-0x00007FFE86230000-0x00007FFE8623B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1322-0x00007FFE86240000-0x00007FFE8624B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1321-0x00007FFE86250000-0x00007FFE8625C000-memory.dmp

    Filesize

    48KB

  • memory/4928-1302-0x00007FFE76150000-0x00007FFE76679000-memory.dmp

    Filesize

    5.2MB

  • memory/4928-1325-0x00007FFE85F50000-0x00007FFE85F5B000-memory.dmp

    Filesize

    44KB

  • memory/4928-1310-0x00007FFE76030000-0x00007FFE7614A000-memory.dmp

    Filesize

    1.1MB

  • memory/4928-1113-0x00007FFE76680000-0x00007FFE76D45000-memory.dmp

    Filesize

    6.8MB

  • memory/4928-1176-0x00007FFE867A0000-0x00007FFE867AB000-memory.dmp

    Filesize

    44KB

  • memory/4928-1175-0x00007FFE86260000-0x00007FFE8632D000-memory.dmp

    Filesize

    820KB

  • memory/4928-1174-0x00007FFE867B0000-0x00007FFE867D5000-memory.dmp

    Filesize

    148KB

  • memory/4928-1173-0x00007FFE76680000-0x00007FFE76D45000-memory.dmp

    Filesize

    6.8MB

  • memory/4928-1162-0x00007FFE8BDB0000-0x00007FFE8BDBD000-memory.dmp

    Filesize

    52KB