Analysis
-
max time kernel
1800s -
max time network
1208s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2023 22:24
Behavioral task
behavioral1
Sample
Auto Forge and mod downloader.exe
Resource
win7-20221111-en
General
-
Target
Auto Forge and mod downloader.exe
-
Size
7.0MB
-
MD5
9805f2e2c5d2dfb27f9435f4f6efd3dd
-
SHA1
5a2a2735e72cd2a8a1e6eff977bb622452bca4fc
-
SHA256
a27b9580607ca860dc78c19450cf06b0c66c0a3b8b36334909112fa6c275317e
-
SHA512
f0056a15b6f16ed781e5c03d3e48ac1e5e29cc710a4d39e6fd84d6a66afa9f3ddaa0c67bc60ee37b44ad0768caf61bacaff08c608a0622a990cec81905c8b69f
-
SSDEEP
196608:Mplk5be+eNOx+yAiWfGHpdoGXgktifyDE:ulIbeBQ7QfWpSktiEE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Camera.exepid process 3792 Camera.exe -
Loads dropped DLL 19 IoCs
Processes:
Auto Forge and mod downloader.exepid process 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe 4392 Auto Forge and mod downloader.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI46562\python310.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\python310.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_lzma.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_lzma.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_bz2.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_bz2.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_socket.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_socket.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\select.pyd upx behavioral2/memory/4392-145-0x00007FFA32F50000-0x00007FFA333BF000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_ssl.pyd upx behavioral2/memory/4392-150-0x00007FFA46AC0000-0x00007FFA46AD9000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\libcrypto-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_ssl.pyd upx behavioral2/memory/4392-149-0x00007FFA47B20000-0x00007FFA47B39000-memory.dmp upx behavioral2/memory/4392-147-0x00007FFA42220000-0x00007FFA4224D000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\select.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\libssl-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\libssl-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\libcrypto-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\libcrypto-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_hashlib.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_hashlib.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_queue.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_queue.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_sqlite3.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_sqlite3.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\sqlite3.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\sqlite3.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\PIL\_imaging.cp310-win_amd64.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\PIL\_imaging.cp310-win_amd64.pyd upx behavioral2/memory/4392-167-0x00007FFA4B520000-0x00007FFA4B52D000-memory.dmp upx behavioral2/memory/4392-168-0x00007FFA41D70000-0x00007FFA41D9E000-memory.dmp upx behavioral2/memory/4392-169-0x00007FFA41C30000-0x00007FFA41CE8000-memory.dmp upx behavioral2/memory/4392-170-0x00007FFA32BD0000-0x00007FFA32F45000-memory.dmp upx behavioral2/memory/4392-172-0x00007FFA416E0000-0x00007FFA416F4000-memory.dmp upx behavioral2/memory/4392-173-0x00007FFA416D0000-0x00007FFA416DD000-memory.dmp upx behavioral2/memory/4392-174-0x00007FFA39290000-0x00007FFA392AF000-memory.dmp upx behavioral2/memory/4392-175-0x00007FFA32350000-0x00007FFA324B9000-memory.dmp upx behavioral2/memory/4392-176-0x00007FFA32100000-0x00007FFA3234E000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\win32crypt.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\win32crypt.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\pywin32_system32\pywintypes310.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\pywin32_system32\pywintypes310.dll upx behavioral2/memory/4392-191-0x00007FFA38D50000-0x00007FFA38D7B000-memory.dmp upx behavioral2/memory/4392-192-0x00007FFA33A00000-0x00007FFA33A2F000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\unicodedata.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\unicodedata.pyd upx behavioral2/memory/4392-209-0x00007FFA32590000-0x00007FFA326A8000-memory.dmp upx behavioral2/memory/4392-213-0x00007FFA32F50000-0x00007FFA333BF000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_decimal.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\_decimal.pyd upx behavioral2/memory/4392-230-0x00007FFA46AC0000-0x00007FFA46AD9000-memory.dmp upx behavioral2/memory/4392-231-0x00007FFA338B0000-0x00007FFA338F2000-memory.dmp upx behavioral2/memory/4392-250-0x00007FFA41D70000-0x00007FFA41D9E000-memory.dmp upx behavioral2/memory/4392-251-0x00007FFA41C30000-0x00007FFA41CE8000-memory.dmp upx behavioral2/memory/4392-252-0x00007FFA32BD0000-0x00007FFA32F45000-memory.dmp upx behavioral2/memory/4392-256-0x00007FFA32350000-0x00007FFA324B9000-memory.dmp upx behavioral2/memory/4392-257-0x00007FFA32100000-0x00007FFA3234E000-memory.dmp upx behavioral2/memory/4392-254-0x00007FFA39290000-0x00007FFA392AF000-memory.dmp upx behavioral2/memory/4392-275-0x00007FFA32590000-0x00007FFA326A8000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\Camera.exe upx behavioral2/memory/3792-283-0x0000000000120000-0x0000000000137000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI46562\Camera.exe upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2456 powershell.exe 2456 powershell.exe 176 powershell.exe 4852 powershell.exe 176 powershell.exe 4852 powershell.exe 4320 powershell.exe 4320 powershell.exe 2608 powershell.exe 2608 powershell.exe 4928 powershell.exe 4928 powershell.exe 4928 powershell.exe 1460 powershell.exe 1460 powershell.exe 1460 powershell.exe 528 powershell.exe 528 powershell.exe 1452 powershell.exe 1452 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exetasklist.exeWMIC.exepowershell.exeWMIC.exepowershell.exedescription pid process Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 176 powershell.exe Token: SeDebugPrivilege 4852 powershell.exe Token: SeDebugPrivilege 4320 powershell.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 4708 tasklist.exe Token: SeIncreaseQuotaPrivilege 2060 WMIC.exe Token: SeSecurityPrivilege 2060 WMIC.exe Token: SeTakeOwnershipPrivilege 2060 WMIC.exe Token: SeLoadDriverPrivilege 2060 WMIC.exe Token: SeSystemProfilePrivilege 2060 WMIC.exe Token: SeSystemtimePrivilege 2060 WMIC.exe Token: SeProfSingleProcessPrivilege 2060 WMIC.exe Token: SeIncBasePriorityPrivilege 2060 WMIC.exe Token: SeCreatePagefilePrivilege 2060 WMIC.exe Token: SeBackupPrivilege 2060 WMIC.exe Token: SeRestorePrivilege 2060 WMIC.exe Token: SeShutdownPrivilege 2060 WMIC.exe Token: SeDebugPrivilege 2060 WMIC.exe Token: SeSystemEnvironmentPrivilege 2060 WMIC.exe Token: SeRemoteShutdownPrivilege 2060 WMIC.exe Token: SeUndockPrivilege 2060 WMIC.exe Token: SeManageVolumePrivilege 2060 WMIC.exe Token: 33 2060 WMIC.exe Token: 34 2060 WMIC.exe Token: 35 2060 WMIC.exe Token: 36 2060 WMIC.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeIncreaseQuotaPrivilege 1636 WMIC.exe Token: SeSecurityPrivilege 1636 WMIC.exe Token: SeTakeOwnershipPrivilege 1636 WMIC.exe Token: SeLoadDriverPrivilege 1636 WMIC.exe Token: SeSystemProfilePrivilege 1636 WMIC.exe Token: SeSystemtimePrivilege 1636 WMIC.exe Token: SeProfSingleProcessPrivilege 1636 WMIC.exe Token: SeIncBasePriorityPrivilege 1636 WMIC.exe Token: SeCreatePagefilePrivilege 1636 WMIC.exe Token: SeBackupPrivilege 1636 WMIC.exe Token: SeRestorePrivilege 1636 WMIC.exe Token: SeShutdownPrivilege 1636 WMIC.exe Token: SeDebugPrivilege 1636 WMIC.exe Token: SeSystemEnvironmentPrivilege 1636 WMIC.exe Token: SeRemoteShutdownPrivilege 1636 WMIC.exe Token: SeUndockPrivilege 1636 WMIC.exe Token: SeManageVolumePrivilege 1636 WMIC.exe Token: 33 1636 WMIC.exe Token: 34 1636 WMIC.exe Token: 35 1636 WMIC.exe Token: 36 1636 WMIC.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeIncreaseQuotaPrivilege 2060 WMIC.exe Token: SeSecurityPrivilege 2060 WMIC.exe Token: SeTakeOwnershipPrivilege 2060 WMIC.exe Token: SeLoadDriverPrivilege 2060 WMIC.exe Token: SeSystemProfilePrivilege 2060 WMIC.exe Token: SeSystemtimePrivilege 2060 WMIC.exe Token: SeProfSingleProcessPrivilege 2060 WMIC.exe Token: SeIncBasePriorityPrivilege 2060 WMIC.exe Token: SeCreatePagefilePrivilege 2060 WMIC.exe Token: SeBackupPrivilege 2060 WMIC.exe Token: SeRestorePrivilege 2060 WMIC.exe Token: SeShutdownPrivilege 2060 WMIC.exe Token: SeDebugPrivilege 2060 WMIC.exe Token: SeSystemEnvironmentPrivilege 2060 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Auto Forge and mod downloader.exeAuto Forge and mod downloader.execmd.execmd.exenet.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4656 wrote to memory of 4392 4656 Auto Forge and mod downloader.exe Auto Forge and mod downloader.exe PID 4656 wrote to memory of 4392 4656 Auto Forge and mod downloader.exe Auto Forge and mod downloader.exe PID 4392 wrote to memory of 5004 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 5004 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 5000 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 5000 4392 Auto Forge and mod downloader.exe cmd.exe PID 5004 wrote to memory of 2456 5004 cmd.exe powershell.exe PID 5004 wrote to memory of 2456 5004 cmd.exe powershell.exe PID 5000 wrote to memory of 1608 5000 cmd.exe net.exe PID 5000 wrote to memory of 1608 5000 cmd.exe net.exe PID 1608 wrote to memory of 3568 1608 net.exe net1.exe PID 1608 wrote to memory of 3568 1608 net.exe net1.exe PID 4392 wrote to memory of 3800 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 3800 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 2704 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 2704 4392 Auto Forge and mod downloader.exe cmd.exe PID 3800 wrote to memory of 176 3800 cmd.exe powershell.exe PID 3800 wrote to memory of 176 3800 cmd.exe powershell.exe PID 2704 wrote to memory of 4852 2704 cmd.exe powershell.exe PID 2704 wrote to memory of 4852 2704 cmd.exe powershell.exe PID 4392 wrote to memory of 3944 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 3944 4392 Auto Forge and mod downloader.exe cmd.exe PID 3944 wrote to memory of 4320 3944 cmd.exe powershell.exe PID 3944 wrote to memory of 4320 3944 cmd.exe powershell.exe PID 4392 wrote to memory of 3320 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 3320 4392 Auto Forge and mod downloader.exe cmd.exe PID 3320 wrote to memory of 2608 3320 cmd.exe powershell.exe PID 3320 wrote to memory of 2608 3320 cmd.exe powershell.exe PID 4392 wrote to memory of 2792 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 2792 4392 Auto Forge and mod downloader.exe cmd.exe PID 2792 wrote to memory of 3084 2792 cmd.exe attrib.exe PID 2792 wrote to memory of 3084 2792 cmd.exe attrib.exe PID 4392 wrote to memory of 4716 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 4716 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 4476 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 4476 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 1068 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 1068 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 2440 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 2440 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 1492 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 1492 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 4120 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 4120 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 1824 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 1824 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 1960 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 1960 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 632 4392 Auto Forge and mod downloader.exe cmd.exe PID 4392 wrote to memory of 632 4392 Auto Forge and mod downloader.exe cmd.exe PID 4716 wrote to memory of 4360 4716 cmd.exe netsh.exe PID 4716 wrote to memory of 4360 4716 cmd.exe netsh.exe PID 4476 wrote to memory of 4732 4476 cmd.exe tree.com PID 4476 wrote to memory of 4732 4476 cmd.exe tree.com PID 1068 wrote to memory of 4928 1068 cmd.exe powershell.exe PID 1068 wrote to memory of 4928 1068 cmd.exe powershell.exe PID 1492 wrote to memory of 4708 1492 cmd.exe tasklist.exe PID 1492 wrote to memory of 4708 1492 cmd.exe tasklist.exe PID 4120 wrote to memory of 2060 4120 cmd.exe WMIC.exe PID 4120 wrote to memory of 2060 4120 cmd.exe WMIC.exe PID 632 wrote to memory of 1460 632 cmd.exe powershell.exe PID 632 wrote to memory of 1460 632 cmd.exe powershell.exe PID 1824 wrote to memory of 1636 1824 cmd.exe WMIC.exe PID 1824 wrote to memory of 1636 1824 cmd.exe WMIC.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\Auto Forge and mod downloader.exe"C:\Users\Admin\AppData\Local\Temp\Auto Forge and mod downloader.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Auto Forge and mod downloader.exe"C:\Users\Admin\AppData\Local\Temp\Auto Forge and mod downloader.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Unblock-File '.\Auto Forge and mod downloader.exe'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Unblock-File '.\Auto Forge and mod downloader.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "net session"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet session4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Auto Forge and mod downloader.exe'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Auto Forge and mod downloader.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\_MEI46562'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\_MEI46562'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s 'C:\Users\Admin\AppData\Local\Temp\Auto Forge and mod downloader.exe'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +h +s 'C:\Users\Admin\AppData\Local\Temp\Auto Forge and mod downloader.exe'4⤵
- Views/modifies file attributes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\tree.comtree /A /F4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Unblock-File '.\Camera'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Unblock-File '.\Camera'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "dir leveldb /AD /s /b"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"3⤵
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
-
C:\Windows\system32\tree.comtree /A /F4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "dir leveldb /AD /s /b"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "where /r . *.sqlite"3⤵
-
C:\Windows\system32\where.exewhere /r . *.sqlite4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
-
C:\Windows\system32\tree.comtree /A /F4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
-
C:\Windows\system32\tree.comtree /A /F4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"3⤵
-
C:\Windows\system32\tree.comtree /A /F4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "Camera.exe /devlist"3⤵
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\Camera.exeCamera.exe /devlist4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5612b19feac3b60bdc771ec888769ea75
SHA1cc0117dc3f83e139f22d7c9f068a0fa2027fc8fb
SHA2563eb12f5e02a7aad8764186e1f62d9cebcc8667c854ebf4356fe404f042b84ec1
SHA5122f56333015641eb11b853a350ca5a01763ab9fd2d572fca51ba2d7df3018546c9667a64ba670e443e0fef5c10879964bfe18084ae0b44e95cb17dcc864ffd4af
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD59a8c63acacd93c2ab0b47464e9a50823
SHA1ef2e1336e5bc844ff3bf64cef19b58453459553c
SHA25637150b2aa4bc93d88e21914cedb6f1928659a20fad8c5cd9a15cc72997ac43d9
SHA51230b86f6c470fa76e0d95c9b7321d1f5d8e3799b04f9236664b064de24e0a7544910e7edae19be9c9639716526d0fdca09b71f48c9950d1377945dd666ec1c7c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD59a8c63acacd93c2ab0b47464e9a50823
SHA1ef2e1336e5bc844ff3bf64cef19b58453459553c
SHA25637150b2aa4bc93d88e21914cedb6f1928659a20fad8c5cd9a15cc72997ac43d9
SHA51230b86f6c470fa76e0d95c9b7321d1f5d8e3799b04f9236664b064de24e0a7544910e7edae19be9c9639716526d0fdca09b71f48c9950d1377945dd666ec1c7c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD59bc110200117a3752313ca2acaf8a9e1
SHA1fda6b7da2e7b0175b391475ca78d1b4cf2147cd3
SHA256c88e4bbb64f7fa31429ebe82c1cf07785c44486f37576f783a26ac856e02a4eb
SHA5121f1af32aa18a8cbfcc65b0d4fb7e6ca2705f125eaa85789e981ee68b90c64522e954825abf460d4b4f97567715dfae8d9b0a25a4d54d10bc4c257c472f2e80fb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD59a2c763c5ff40e18e49ad63c7c3b0088
SHA14b289ea34755323fa869da6ad6480d8d12385a36
SHA256517807921c55bd16cd8a8bfae3d5dc19444c66f836b66acd5593e3080acbaf8e
SHA5123af01926bc7de92076067d158d7250b206d396b3282ee0db43639d04d91bd9ff763acbce12c7822914824984a3c5fdd1b8dbf1ad2ee88233d47f0f808b746bc8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD55c083327834381bbc217cc7a8fbe1e6d
SHA1706ccc4e8fbae07d16c0ca54022a6662635ca810
SHA256521140961da1095018e7491eb7002434aff0b6a0c71f01b9b1b91c69281040ca
SHA512274a1b2636e012d00091a2eef8bdff0dbd6c87c1663a437c94df34950f0a4a46b6c6b8278cd4ac082f1f684e4fd84e9fdf76f2c4432e77d35850b78eaae1f1c9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD55c083327834381bbc217cc7a8fbe1e6d
SHA1706ccc4e8fbae07d16c0ca54022a6662635ca810
SHA256521140961da1095018e7491eb7002434aff0b6a0c71f01b9b1b91c69281040ca
SHA512274a1b2636e012d00091a2eef8bdff0dbd6c87c1663a437c94df34950f0a4a46b6c6b8278cd4ac082f1f684e4fd84e9fdf76f2c4432e77d35850b78eaae1f1c9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD5ede4fc8447687dce8af03a415ec2981d
SHA193fae0878f75e0cf8eca5e04e63f5ed0b87ae065
SHA256dcefa3c1ac1ada644f9c39a4f1ec7786254de06fdb1ced66190aeb5389aa1be1
SHA5122fa32acb30cda9465860aa751b934bce4fac2dfe651b44b1002848d0b6ad35ebdb85ee569014b7fcb0ed298aade77632ad3a480dbbd128fc692c6310044814f7
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\CameraFilesize
28KB
MD5546170e5009b8dfdd1c6d0a83ad1f6eb
SHA1e3be111bbe736f39e02ef43210a17c3b497511de
SHA25652b9e339f35b8f079c14a2cb3bcb22ae2c0224493081063f42759e379ba3d902
SHA512d0c2a2311e2d70b07ab2e3c7d269e85cb3b21e0dad4cc13eb43d8e45a28a1dd0ff99ef69f1547c41a083cb995373d54204fb686d42b152bf3eda2dcc104f702b
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\Camera.exeFilesize
28KB
MD5c493787a94fa1eb50507dd7b89bc8dd4
SHA117a56ceaa53fd05b966e5f31d5f8f5f8a1e5cb41
SHA2562b0a6b9532d8afcaacb854cca58c41ba2ee074cd616d459a996a5d8c727d8103
SHA5120484dfda64f9b5c2a8ab1f9137e37e16901e64c15866481a898f2ffc5606284da7c45c52e23d9ef49bd5e81ddd9d420c20a6a8fe68308eb0b4e5e7ef9c56ac8b
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\Camera.exeFilesize
28KB
MD5c493787a94fa1eb50507dd7b89bc8dd4
SHA117a56ceaa53fd05b966e5f31d5f8f5f8a1e5cb41
SHA2562b0a6b9532d8afcaacb854cca58c41ba2ee074cd616d459a996a5d8c727d8103
SHA5120484dfda64f9b5c2a8ab1f9137e37e16901e64c15866481a898f2ffc5606284da7c45c52e23d9ef49bd5e81ddd9d420c20a6a8fe68308eb0b4e5e7ef9c56ac8b
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\PIL\_imaging.cp310-win_amd64.pydFilesize
727KB
MD5b71e182c2c7de464bb80eb56ad652d80
SHA1b14f741711f30cd7ab9e977da324c206c19dc53d
SHA2568c5da4bd25a9fd9b4d67c60b9cb795b5c4bb3cbd4c5c30c77d75e97523369bda
SHA512ff8d5e97348c465de807fe11527d2f47d40f806fc1094b11ac57ce3ff8c1da74268cdb2edf16fb2020c097f42659b7008ba028e469af984b69e85648e1d9f934
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\PIL\_imaging.cp310-win_amd64.pydFilesize
727KB
MD5b71e182c2c7de464bb80eb56ad652d80
SHA1b14f741711f30cd7ab9e977da324c206c19dc53d
SHA2568c5da4bd25a9fd9b4d67c60b9cb795b5c4bb3cbd4c5c30c77d75e97523369bda
SHA512ff8d5e97348c465de807fe11527d2f47d40f806fc1094b11ac57ce3ff8c1da74268cdb2edf16fb2020c097f42659b7008ba028e469af984b69e85648e1d9f934
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\VCRUNTIME140.dllFilesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\VCRUNTIME140.dllFilesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_bz2.pydFilesize
46KB
MD5b3a4ff2ed62cc66972ba6b50c012e225
SHA11d3add329d99d00058406dc95badaf0cdf961cea
SHA256703e120bb721420b223f43715e31b6a1a73a730825f06f377809774157f908aa
SHA512ed819bcb083b0c193d466467d06ce1c23159a8a43fb090b9beda2bede1e7bd01e1bdd23b5508b54f8bf87fad9980c9df4be2da985ed176a2aaca8cc2ca5ae38a
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_bz2.pydFilesize
46KB
MD5b3a4ff2ed62cc66972ba6b50c012e225
SHA11d3add329d99d00058406dc95badaf0cdf961cea
SHA256703e120bb721420b223f43715e31b6a1a73a730825f06f377809774157f908aa
SHA512ed819bcb083b0c193d466467d06ce1c23159a8a43fb090b9beda2bede1e7bd01e1bdd23b5508b54f8bf87fad9980c9df4be2da985ed176a2aaca8cc2ca5ae38a
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_decimal.pydFilesize
104KB
MD536d42c48043c01c5329a6fdbb65e2506
SHA10c0fbda3c0a114ecc360ef1cdf16342dbb04fd9b
SHA256243e87bc9d759ea0b38f99485c4f86b67cacad775bef0cd021241efc910f41e3
SHA512b4e01ec2af6c16c71093d2042d017d27b4927896437849dbfe22ed398f02b15f54efa2ee0335cf8ca4da06320354f0e1c6109b5fff5de4587af617346323e12a
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_decimal.pydFilesize
104KB
MD536d42c48043c01c5329a6fdbb65e2506
SHA10c0fbda3c0a114ecc360ef1cdf16342dbb04fd9b
SHA256243e87bc9d759ea0b38f99485c4f86b67cacad775bef0cd021241efc910f41e3
SHA512b4e01ec2af6c16c71093d2042d017d27b4927896437849dbfe22ed398f02b15f54efa2ee0335cf8ca4da06320354f0e1c6109b5fff5de4587af617346323e12a
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_hashlib.pydFilesize
33KB
MD5958295eeafc8cc7066791e35a10b9027
SHA1354783d904aaba66eb430ac017727aa17372e33b
SHA2562f1ae35eec211f0af66a7897b5cfe7ead8f2b548d2d4dd7f5cd4d4af189ee330
SHA512783acf3b17efefbdacad315b3f91ffd12d76dfa93e7b92fbae78e6a9d0c0ebda403c0ae17dd068bcc1b4baf322dc5a7f41b994507a5a9c722f19c6c3a431e291
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_hashlib.pydFilesize
33KB
MD5958295eeafc8cc7066791e35a10b9027
SHA1354783d904aaba66eb430ac017727aa17372e33b
SHA2562f1ae35eec211f0af66a7897b5cfe7ead8f2b548d2d4dd7f5cd4d4af189ee330
SHA512783acf3b17efefbdacad315b3f91ffd12d76dfa93e7b92fbae78e6a9d0c0ebda403c0ae17dd068bcc1b4baf322dc5a7f41b994507a5a9c722f19c6c3a431e291
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_lzma.pydFilesize
84KB
MD5dbf570daf77a8023806b63eecf0ebaa1
SHA1d613bbd829ff143a785f9ed2b072c90301c87cb1
SHA25601c40d8bbec231d121fe55bf30760f85993a033e6b83b869b363191d9a21b8b9
SHA512e9d4a8f6067c0faada72356aa73aaff28d85d16b2201f6b98ad8eda05bba35b94721ef31fd5cd6e137f64aaf6c84d8a2800437eb3d1ef4b12f158cfbae37e8e2
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_lzma.pydFilesize
84KB
MD5dbf570daf77a8023806b63eecf0ebaa1
SHA1d613bbd829ff143a785f9ed2b072c90301c87cb1
SHA25601c40d8bbec231d121fe55bf30760f85993a033e6b83b869b363191d9a21b8b9
SHA512e9d4a8f6067c0faada72356aa73aaff28d85d16b2201f6b98ad8eda05bba35b94721ef31fd5cd6e137f64aaf6c84d8a2800437eb3d1ef4b12f158cfbae37e8e2
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_queue.pydFilesize
24KB
MD54d681f1d6501d738d5088ce60c727801
SHA1821a10e1a39a2902b627c255c5b018e37f9f0f3c
SHA256a113c858e3bd01108f9273905842106ee3a75b77c12ea2d0deec54c7ab63b667
SHA512d8600eba534abb3ae01bb940575d2a45b4e34fdca15b188c92ebf0d374b01fc5b2e08266a6f208c383e99ebdd9e819745f7dd858d2b5b1e387cc8f6c33cf88c5
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_queue.pydFilesize
24KB
MD54d681f1d6501d738d5088ce60c727801
SHA1821a10e1a39a2902b627c255c5b018e37f9f0f3c
SHA256a113c858e3bd01108f9273905842106ee3a75b77c12ea2d0deec54c7ab63b667
SHA512d8600eba534abb3ae01bb940575d2a45b4e34fdca15b188c92ebf0d374b01fc5b2e08266a6f208c383e99ebdd9e819745f7dd858d2b5b1e387cc8f6c33cf88c5
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_socket.pydFilesize
41KB
MD50da06b3c5520c1636a924b71401de250
SHA129921341e7d9167c6c15348356134ec2e3a6128e
SHA256556813424b0af083338fcb3fa90c03df6ab273f24a95633137d33694e8a597bb
SHA5129e34369c2aa7d867b5123785f36a99ff0b95b9263dc17011cd05af4bdd058b5b6f6764d7200c14acb7c9f2cf354f21f89635fecad1da1f0a0ebf2758f9cd2333
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_socket.pydFilesize
41KB
MD50da06b3c5520c1636a924b71401de250
SHA129921341e7d9167c6c15348356134ec2e3a6128e
SHA256556813424b0af083338fcb3fa90c03df6ab273f24a95633137d33694e8a597bb
SHA5129e34369c2aa7d867b5123785f36a99ff0b95b9263dc17011cd05af4bdd058b5b6f6764d7200c14acb7c9f2cf354f21f89635fecad1da1f0a0ebf2758f9cd2333
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_sqlite3.pydFilesize
48KB
MD5856a423a98b57f3c9e064aa3b6751f6d
SHA1ce222aedec0f9dc4ed2bb1729559f0e0089f091d
SHA256a06ae6146d95dc7101e02646177a388dc390aa5f3c681d992cca89fa824c5f67
SHA51252d51aae3ddc085d328d9e7c53c1fc969b7e84161f634d3c640ba3e426520a8a63ea625f53a1a23a108f40d733325030bed54335aff7e6b898d7ab041cbc3360
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_sqlite3.pydFilesize
48KB
MD5856a423a98b57f3c9e064aa3b6751f6d
SHA1ce222aedec0f9dc4ed2bb1729559f0e0089f091d
SHA256a06ae6146d95dc7101e02646177a388dc390aa5f3c681d992cca89fa824c5f67
SHA51252d51aae3ddc085d328d9e7c53c1fc969b7e84161f634d3c640ba3e426520a8a63ea625f53a1a23a108f40d733325030bed54335aff7e6b898d7ab041cbc3360
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_ssl.pydFilesize
60KB
MD554fabe36bb934fab4f5fe0738db928a9
SHA1ccaf020e550bd3fd7770e84affc5a4d9d4c33f30
SHA256b6fe6e010eafa2d120e99841fba204dd66a7e2e9e314829d81ee8c161f1cfe8a
SHA5125948f18a21371e6eb2604e1af5451839abbfc08340d19a20f3c198f2378fbb821b08e88f400d1b26b7b48df0a491f52a8559ef536d3da5a64dcd2f7bdc5e09f8
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\_ssl.pydFilesize
60KB
MD554fabe36bb934fab4f5fe0738db928a9
SHA1ccaf020e550bd3fd7770e84affc5a4d9d4c33f30
SHA256b6fe6e010eafa2d120e99841fba204dd66a7e2e9e314829d81ee8c161f1cfe8a
SHA5125948f18a21371e6eb2604e1af5451839abbfc08340d19a20f3c198f2378fbb821b08e88f400d1b26b7b48df0a491f52a8559ef536d3da5a64dcd2f7bdc5e09f8
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\base_library.zipFilesize
1.0MB
MD5ceb9a5d3275f2c1d06ebce635c0cc89b
SHA1096cd281e4608184b5e4df40fd3dcb694b62ab4d
SHA256e583ad748e21f3c30ae71bb3135e46f0462a2ad61320ef2d86d1ac6528083ad2
SHA5126600ee545709768c1b21e1dccfe838d334ec174978fda3c424f33808dfe7317ce32d934b11f31a8a7c212bff674229cd1ae833591d2fc951df4e9f76ba167e43
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\config.jsonFilesize
136B
MD5e2ff70400f5f9d513ef3be2c21263b0f
SHA199e3f0036ef925df6a9b56545a2ef9410b3f8e5e
SHA256df60e0426e9ee62b6978ce7056f0287770459fba91c2dd6b4542dd4c050f12f3
SHA512e4e5d28f5ad95556252398cef48997794f3933d9c09a61aabfb00193b1200a46384be899d8aae922d54be757a2724cd28dac69e6b81af5139a3214b3fc2b1d71
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\injection-obfuscated.jsFilesize
32KB
MD5f421db9f34f345d816206f6554d11c29
SHA1ecfc28673328191acbfaa1aa6e7588963e9da04c
SHA256b99e8f5b7f4f7adfba03ea429478a2b21ff4fe481e8820768ab4f04ba8e5b3ba
SHA512b29a302a372c0d352bfde27d14dbd5ac3f5a438371ee2c9cafb6030a47209b706c9bae65ade55d23c4114ce63204ff003e27059bf9a99cc731b80b2288c33905
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\libcrypto-1_1.dllFilesize
1.1MB
MD58a0b20d8e0e7f225693d711d556adc8a
SHA19486b7bdba3682f29f918ec22ec3d3f0dd0101fd
SHA2560b7ba07933749e08f265ce5f9361a52cd00c86c84713db8c7b6955e75fb8359b
SHA512164b5138e708c494094c60084945b24c73ff345433c8231fcc79a8fa5059634374f8998b04d9a967e37cde8af88bd4ff4484eca641fe112952af4b98081d7bda
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\libcrypto-1_1.dllFilesize
1.1MB
MD58a0b20d8e0e7f225693d711d556adc8a
SHA19486b7bdba3682f29f918ec22ec3d3f0dd0101fd
SHA2560b7ba07933749e08f265ce5f9361a52cd00c86c84713db8c7b6955e75fb8359b
SHA512164b5138e708c494094c60084945b24c73ff345433c8231fcc79a8fa5059634374f8998b04d9a967e37cde8af88bd4ff4484eca641fe112952af4b98081d7bda
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\libcrypto-1_1.dllFilesize
1.1MB
MD58a0b20d8e0e7f225693d711d556adc8a
SHA19486b7bdba3682f29f918ec22ec3d3f0dd0101fd
SHA2560b7ba07933749e08f265ce5f9361a52cd00c86c84713db8c7b6955e75fb8359b
SHA512164b5138e708c494094c60084945b24c73ff345433c8231fcc79a8fa5059634374f8998b04d9a967e37cde8af88bd4ff4484eca641fe112952af4b98081d7bda
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\libssl-1_1.dllFilesize
203KB
MD55fba49b16f11befe297103bc28f20940
SHA1412a4d12b6837314826b3ab8f868182da12b1f1a
SHA256cc147f1b1467d4646450b66a8e59d26980a50f36fd3176eb2701e7bd28b22c72
SHA51262881a3b70afea335819ca2fafe85711607ce526f45a628fa775574c36ff3b287d5c9b9a8449131831e15644048a5e8255c3cae91487bd8cdd90e684748dec98
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\libssl-1_1.dllFilesize
203KB
MD55fba49b16f11befe297103bc28f20940
SHA1412a4d12b6837314826b3ab8f868182da12b1f1a
SHA256cc147f1b1467d4646450b66a8e59d26980a50f36fd3176eb2701e7bd28b22c72
SHA51262881a3b70afea335819ca2fafe85711607ce526f45a628fa775574c36ff3b287d5c9b9a8449131831e15644048a5e8255c3cae91487bd8cdd90e684748dec98
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\python310.dllFilesize
1.5MB
MD5f8588acfbe613c10995ce5e1f81d630d
SHA1632657d4b0e83dfdfa41d36e770c43e1c097847a
SHA25659076f6db6590a0aaa7a98abc05080387db9f3aba2b47512bf1101a502b955b7
SHA5120a33e145575e332022b2a54d2478e292c10ce276bbcd9716649cf6875cfea065bf449455b140a109c7a841cd45714330c1df250d05ed32228f82e4294874559b
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\python310.dllFilesize
1.5MB
MD5f8588acfbe613c10995ce5e1f81d630d
SHA1632657d4b0e83dfdfa41d36e770c43e1c097847a
SHA25659076f6db6590a0aaa7a98abc05080387db9f3aba2b47512bf1101a502b955b7
SHA5120a33e145575e332022b2a54d2478e292c10ce276bbcd9716649cf6875cfea065bf449455b140a109c7a841cd45714330c1df250d05ed32228f82e4294874559b
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\pywin32_system32\pywintypes310.dllFilesize
61KB
MD5b542b9a5e7cef3696bf3332217ad4550
SHA11525ecda86e364a432d16407e00c0e4c7df6b783
SHA2561646da1cbc117a28ed7d373f4b0b5e1a884a06f49a0be8b9d408aa13b7091058
SHA512d65e62dcd5528166ed8b16f2184fa8e65784a34b8b72f855f473e169b887590f657cac81b3dfe1eb83247e2d43156f996be68a87105883d0a83cd1c324ead313
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\pywin32_system32\pywintypes310.dllFilesize
61KB
MD5b542b9a5e7cef3696bf3332217ad4550
SHA11525ecda86e364a432d16407e00c0e4c7df6b783
SHA2561646da1cbc117a28ed7d373f4b0b5e1a884a06f49a0be8b9d408aa13b7091058
SHA512d65e62dcd5528166ed8b16f2184fa8e65784a34b8b72f855f473e169b887590f657cac81b3dfe1eb83247e2d43156f996be68a87105883d0a83cd1c324ead313
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\select.pydFilesize
24KB
MD59eebab70c422a9e2ac0f8f26bf9f12b4
SHA163610d6e30d121b61bf76d186e124a0035f28798
SHA256e6c5020ea4995318e0e53a5e2fb5d5aa48c1f6d23fe6d777e20f5e5d51a3181d
SHA5126c711ed5084053217f38de8870949a040a6598af7c2bec36829bc49fb644067a902699a110d9dce3d351ed4caed4ea1076f421d3af5b7f88959e23b60865c747
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\select.pydFilesize
24KB
MD59eebab70c422a9e2ac0f8f26bf9f12b4
SHA163610d6e30d121b61bf76d186e124a0035f28798
SHA256e6c5020ea4995318e0e53a5e2fb5d5aa48c1f6d23fe6d777e20f5e5d51a3181d
SHA5126c711ed5084053217f38de8870949a040a6598af7c2bec36829bc49fb644067a902699a110d9dce3d351ed4caed4ea1076f421d3af5b7f88959e23b60865c747
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\sqlite3.dllFilesize
606KB
MD513fd19b44ce28ee50116cfe7a4801fb4
SHA170c3ad674d161051a6f2081cbeb13587bf4c146a
SHA2568401d3ff11a0f9114a5e308405e0433d3d404725d40b3ecaf6db313e0373cedf
SHA51232bd4b3528fe9e8c1d00bad935666fc2699840c0b9a29547b49d97a275f039c6142d668073b8145f7771f59c465bd152e72b79ce5b844fc3a600527965456f5b
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\sqlite3.dllFilesize
606KB
MD513fd19b44ce28ee50116cfe7a4801fb4
SHA170c3ad674d161051a6f2081cbeb13587bf4c146a
SHA2568401d3ff11a0f9114a5e308405e0433d3d404725d40b3ecaf6db313e0373cedf
SHA51232bd4b3528fe9e8c1d00bad935666fc2699840c0b9a29547b49d97a275f039c6142d668073b8145f7771f59c465bd152e72b79ce5b844fc3a600527965456f5b
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\unicodedata.pydFilesize
288KB
MD5e186b6e877585600277c4c357da8d7b0
SHA1d2c239dfefbb940678d416c359bbabb0346c5bed
SHA25665b8ee9f7e80116d5ec70a3e14a99b4e21d77c29613271bcc7778ec621bbcf11
SHA512bdcce866141f530c7cdea7edc4e6c20ce8051fa308c4f0cabcb74bc5e72a2f45f708e8de021594ad7aea593771b38f1f79f995d3104a8347abbf63d44e4e66c7
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\unicodedata.pydFilesize
288KB
MD5e186b6e877585600277c4c357da8d7b0
SHA1d2c239dfefbb940678d416c359bbabb0346c5bed
SHA25665b8ee9f7e80116d5ec70a3e14a99b4e21d77c29613271bcc7778ec621bbcf11
SHA512bdcce866141f530c7cdea7edc4e6c20ce8051fa308c4f0cabcb74bc5e72a2f45f708e8de021594ad7aea593771b38f1f79f995d3104a8347abbf63d44e4e66c7
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\win32crypt.pydFilesize
51KB
MD5405b3cd1fbe9016e862c7b255c48dec5
SHA1cffaffc80cf0e18de57d14f380e0e764a12fe414
SHA2563803eec31eae7ad909499f44a31427d51116397dd90b90ae1ab21064d33bc4d6
SHA512348c7fc10bb093813e885aa571630e6210b0a8523d64082af2120f370559b75117e280175d13afe9c02e7a0fc230bd50efdcf7a05c510787bf19c9dbff2e6556
-
C:\Users\Admin\AppData\Local\Temp\_MEI46562\win32crypt.pydFilesize
51KB
MD5405b3cd1fbe9016e862c7b255c48dec5
SHA1cffaffc80cf0e18de57d14f380e0e764a12fe414
SHA2563803eec31eae7ad909499f44a31427d51116397dd90b90ae1ab21064d33bc4d6
SHA512348c7fc10bb093813e885aa571630e6210b0a8523d64082af2120f370559b75117e280175d13afe9c02e7a0fc230bd50efdcf7a05c510787bf19c9dbff2e6556
-
memory/176-190-0x0000000000000000-mapping.dmp
-
memory/176-202-0x00007FFA31580000-0x00007FFA32041000-memory.dmpFilesize
10.8MB
-
memory/176-197-0x00007FFA31580000-0x00007FFA32041000-memory.dmpFilesize
10.8MB
-
memory/528-272-0x00007FFA310D0000-0x00007FFA31B91000-memory.dmpFilesize
10.8MB
-
memory/528-269-0x0000000000000000-mapping.dmp
-
memory/528-271-0x00007FFA310D0000-0x00007FFA31B91000-memory.dmpFilesize
10.8MB
-
memory/632-229-0x0000000000000000-mapping.dmp
-
memory/688-248-0x0000000000000000-mapping.dmp
-
memory/1000-262-0x0000000000000000-mapping.dmp
-
memory/1068-219-0x0000000000000000-mapping.dmp
-
memory/1452-277-0x0000000000000000-mapping.dmp
-
memory/1452-284-0x00007FFA31180000-0x00007FFA31C41000-memory.dmpFilesize
10.8MB
-
memory/1452-278-0x00007FFA31180000-0x00007FFA31C41000-memory.dmpFilesize
10.8MB
-
memory/1460-237-0x0000000000000000-mapping.dmp
-
memory/1460-245-0x00007FFA30D80000-0x00007FFA31841000-memory.dmpFilesize
10.8MB
-
memory/1460-261-0x00007FFA30D80000-0x00007FFA31841000-memory.dmpFilesize
10.8MB
-
memory/1492-224-0x0000000000000000-mapping.dmp
-
memory/1608-185-0x0000000000000000-mapping.dmp
-
memory/1636-238-0x0000000000000000-mapping.dmp
-
memory/1808-274-0x0000000000000000-mapping.dmp
-
memory/1824-226-0x0000000000000000-mapping.dmp
-
memory/1924-259-0x0000000000000000-mapping.dmp
-
memory/1960-227-0x0000000000000000-mapping.dmp
-
memory/2028-249-0x0000000000000000-mapping.dmp
-
memory/2060-236-0x0000000000000000-mapping.dmp
-
memory/2440-222-0x0000000000000000-mapping.dmp
-
memory/2456-184-0x0000000000000000-mapping.dmp
-
memory/2456-187-0x0000019273430000-0x0000019273452000-memory.dmpFilesize
136KB
-
memory/2456-196-0x00007FFA31580000-0x00007FFA32041000-memory.dmpFilesize
10.8MB
-
memory/2456-194-0x00007FFA31580000-0x00007FFA32041000-memory.dmpFilesize
10.8MB
-
memory/2608-211-0x0000000000000000-mapping.dmp
-
memory/2608-214-0x00007FFA31630000-0x00007FFA320F1000-memory.dmpFilesize
10.8MB
-
memory/2704-189-0x0000000000000000-mapping.dmp
-
memory/2792-215-0x0000000000000000-mapping.dmp
-
memory/3000-273-0x0000000000000000-mapping.dmp
-
memory/3064-267-0x0000000000000000-mapping.dmp
-
memory/3084-216-0x0000000000000000-mapping.dmp
-
memory/3108-263-0x0000000000000000-mapping.dmp
-
memory/3120-258-0x0000000000000000-mapping.dmp
-
memory/3204-268-0x0000000000000000-mapping.dmp
-
memory/3320-210-0x0000000000000000-mapping.dmp
-
memory/3400-246-0x0000000000000000-mapping.dmp
-
memory/3404-242-0x0000000000000000-mapping.dmp
-
memory/3440-241-0x0000000000000000-mapping.dmp
-
memory/3460-239-0x0000000000000000-mapping.dmp
-
memory/3568-186-0x0000000000000000-mapping.dmp
-
memory/3792-283-0x0000000000120000-0x0000000000137000-memory.dmpFilesize
92KB
-
memory/3792-281-0x0000000000000000-mapping.dmp
-
memory/3792-287-0x00000000750C0000-0x00000000750F9000-memory.dmpFilesize
228KB
-
memory/3792-286-0x0000000000120000-0x0000000000137000-memory.dmpFilesize
92KB
-
memory/3800-188-0x0000000000000000-mapping.dmp
-
memory/3944-203-0x0000000000000000-mapping.dmp
-
memory/4036-247-0x0000000000000000-mapping.dmp
-
memory/4120-225-0x0000000000000000-mapping.dmp
-
memory/4172-266-0x0000000000000000-mapping.dmp
-
memory/4320-204-0x0000000000000000-mapping.dmp
-
memory/4320-206-0x00007FFA31630000-0x00007FFA320F1000-memory.dmpFilesize
10.8MB
-
memory/4360-232-0x0000000000000000-mapping.dmp
-
memory/4392-175-0x00007FFA32350000-0x00007FFA324B9000-memory.dmpFilesize
1.4MB
-
memory/4392-173-0x00007FFA416D0000-0x00007FFA416DD000-memory.dmpFilesize
52KB
-
memory/4392-230-0x00007FFA46AC0000-0x00007FFA46AD9000-memory.dmpFilesize
100KB
-
memory/4392-303-0x00007FFA32590000-0x00007FFA326A8000-memory.dmpFilesize
1.1MB
-
memory/4392-250-0x00007FFA41D70000-0x00007FFA41D9E000-memory.dmpFilesize
184KB
-
memory/4392-251-0x00007FFA41C30000-0x00007FFA41CE8000-memory.dmpFilesize
736KB
-
memory/4392-252-0x00007FFA32BD0000-0x00007FFA32F45000-memory.dmpFilesize
3.5MB
-
memory/4392-253-0x0000028BA18C0000-0x0000028BA1C35000-memory.dmpFilesize
3.5MB
-
memory/4392-302-0x00007FFA32F50000-0x00007FFA333BF000-memory.dmpFilesize
4.4MB
-
memory/4392-301-0x00007FFA33A00000-0x00007FFA33A2F000-memory.dmpFilesize
188KB
-
memory/4392-300-0x00007FFA38D50000-0x00007FFA38D7B000-memory.dmpFilesize
172KB
-
memory/4392-299-0x00007FFA32100000-0x00007FFA3234E000-memory.dmpFilesize
2.3MB
-
memory/4392-256-0x00007FFA32350000-0x00007FFA324B9000-memory.dmpFilesize
1.4MB
-
memory/4392-298-0x00007FFA32350000-0x00007FFA324B9000-memory.dmpFilesize
1.4MB
-
memory/4392-257-0x00007FFA32100000-0x00007FFA3234E000-memory.dmpFilesize
2.3MB
-
memory/4392-254-0x00007FFA39290000-0x00007FFA392AF000-memory.dmpFilesize
124KB
-
memory/4392-297-0x00007FFA39290000-0x00007FFA392AF000-memory.dmpFilesize
124KB
-
memory/4392-213-0x00007FFA32F50000-0x00007FFA333BF000-memory.dmpFilesize
4.4MB
-
memory/4392-209-0x00007FFA32590000-0x00007FFA326A8000-memory.dmpFilesize
1.1MB
-
memory/4392-296-0x00007FFA416D0000-0x00007FFA416DD000-memory.dmpFilesize
52KB
-
memory/4392-295-0x00007FFA416E0000-0x00007FFA416F4000-memory.dmpFilesize
80KB
-
memory/4392-294-0x00007FFA32BD0000-0x00007FFA32F45000-memory.dmpFilesize
3.5MB
-
memory/4392-293-0x00007FFA46AC0000-0x00007FFA46AD9000-memory.dmpFilesize
100KB
-
memory/4392-292-0x00007FFA41C30000-0x00007FFA41CE8000-memory.dmpFilesize
736KB
-
memory/4392-192-0x00007FFA33A00000-0x00007FFA33A2F000-memory.dmpFilesize
188KB
-
memory/4392-191-0x00007FFA38D50000-0x00007FFA38D7B000-memory.dmpFilesize
172KB
-
memory/4392-291-0x00007FFA41D70000-0x00007FFA41D9E000-memory.dmpFilesize
184KB
-
memory/4392-290-0x00007FFA47B20000-0x00007FFA47B39000-memory.dmpFilesize
100KB
-
memory/4392-176-0x00007FFA32100000-0x00007FFA3234E000-memory.dmpFilesize
2.3MB
-
memory/4392-132-0x0000000000000000-mapping.dmp
-
memory/4392-174-0x00007FFA39290000-0x00007FFA392AF000-memory.dmpFilesize
124KB
-
memory/4392-231-0x00007FFA338B0000-0x00007FFA338F2000-memory.dmpFilesize
264KB
-
memory/4392-275-0x00007FFA32590000-0x00007FFA326A8000-memory.dmpFilesize
1.1MB
-
memory/4392-289-0x00007FFA42220000-0x00007FFA4224D000-memory.dmpFilesize
180KB
-
memory/4392-172-0x00007FFA416E0000-0x00007FFA416F4000-memory.dmpFilesize
80KB
-
memory/4392-171-0x0000028BA18C0000-0x0000028BA1C35000-memory.dmpFilesize
3.5MB
-
memory/4392-170-0x00007FFA32BD0000-0x00007FFA32F45000-memory.dmpFilesize
3.5MB
-
memory/4392-288-0x00007FFA4B520000-0x00007FFA4B52D000-memory.dmpFilesize
52KB
-
memory/4392-169-0x00007FFA41C30000-0x00007FFA41CE8000-memory.dmpFilesize
736KB
-
memory/4392-168-0x00007FFA41D70000-0x00007FFA41D9E000-memory.dmpFilesize
184KB
-
memory/4392-167-0x00007FFA4B520000-0x00007FFA4B52D000-memory.dmpFilesize
52KB
-
memory/4392-147-0x00007FFA42220000-0x00007FFA4224D000-memory.dmpFilesize
180KB
-
memory/4392-149-0x00007FFA47B20000-0x00007FFA47B39000-memory.dmpFilesize
100KB
-
memory/4392-150-0x00007FFA46AC0000-0x00007FFA46AD9000-memory.dmpFilesize
100KB
-
memory/4392-145-0x00007FFA32F50000-0x00007FFA333BF000-memory.dmpFilesize
4.4MB
-
memory/4476-218-0x0000000000000000-mapping.dmp
-
memory/4660-265-0x0000000000000000-mapping.dmp
-
memory/4704-264-0x0000000000000000-mapping.dmp
-
memory/4708-235-0x0000000000000000-mapping.dmp
-
memory/4716-217-0x0000000000000000-mapping.dmp
-
memory/4732-233-0x0000000000000000-mapping.dmp
-
memory/4852-201-0x00007FFA31580000-0x00007FFA32041000-memory.dmpFilesize
10.8MB
-
memory/4852-198-0x00007FFA31580000-0x00007FFA32041000-memory.dmpFilesize
10.8MB
-
memory/4852-193-0x0000000000000000-mapping.dmp
-
memory/4856-276-0x0000000000000000-mapping.dmp
-
memory/4900-280-0x0000000000000000-mapping.dmp
-
memory/4928-255-0x00007FFA30D80000-0x00007FFA31841000-memory.dmpFilesize
10.8MB
-
memory/4928-234-0x0000000000000000-mapping.dmp
-
memory/4928-244-0x00007FFA30D80000-0x00007FFA31841000-memory.dmpFilesize
10.8MB
-
memory/5000-183-0x0000000000000000-mapping.dmp
-
memory/5004-182-0x0000000000000000-mapping.dmp
-
memory/5040-240-0x0000000000000000-mapping.dmp