Analysis

  • max time kernel
    32s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-04-2023 11:23

General

  • Target

    ParadoxNumber.exe

  • Size

    7.4MB

  • MD5

    8447d37a913ab3638d1e4900392f2cf9

  • SHA1

    5454e1d1833d0c7b39f48ba914ab77f0db5072de

  • SHA256

    7302496e3ff3c304cb65f31fa72d49bcfa8fb492a0781e77a1d8b60d32c5fa8e

  • SHA512

    7cc05eeb16bbee368cad4c38daa666598d7f92924401235c304cc70d0923f3d2cac6ec4c4666a9a8f065283cb58c044546f5f36ae2d74f58c22a8b5c3df09f27

  • SSDEEP

    196608:K0ZMxlbj3QyshxT+aZRUaaoTC8gPXX44ju1Ii:K04bZsnT+aY1oTC8gPXI4ap

Malware Config

Extracted

Family

revengerat

Botnet

NYAN-CAT

C2

blog.capeturk.com:1111

Mutex

RV_MUTEX-FZMONFueOciq

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 3 IoCs
  • Detects Pyinstaller 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ParadoxNumber.exe
    "C:\Users\Admin\AppData\Local\Temp\ParadoxNumber.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe
      C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3692
      • C:\Users\Admin\AppData\Roaming\Java.exe
        "C:\Users\Admin\AppData\Roaming\Java.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4928
        • C:\Windows\SYSTEM32\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Java.exe" "Java.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:996
    • C:\Users\Admin\AppData\Roaming\ParadoxNumber.exe
      C:\Users\Admin\AppData\Roaming\ParadoxNumber.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3904
      • C:\Users\Admin\AppData\Local\Temp\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops desktop.ini file(s)
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:380
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3644
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            PID:2856
      • C:\Users\Admin\AppData\Local\Temp\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3368
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3544
      • C:\Users\Admin\AppData\Roaming\ParadoxNumber .exe
        "C:\Users\Admin\AppData\Roaming\ParadoxNumber .exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Users\Admin\AppData\Roaming\ParadoxNumber .exe
          "C:\Users\Admin\AppData\Roaming\ParadoxNumber .exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1704
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            5⤵
              PID:1456

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Setup.exe.log
      Filesize

      408B

      MD5

      70f08e6585ed9994d97a4c71472fccd8

      SHA1

      3f44494d4747c87fb8b94bb153c3a3d717f9fd63

      SHA256

      87fbf339c47e259826080aa2dcbdf371ea47a50eec88222c6e64a92906cb37fa

      SHA512

      d381aec2ea869f3b2d06497e934c7fe993df6deac719370bd74310a29e8e48b6497559922d2cb44ace97c4bd7ad00eae8fe92a31081f2119de3ddbb5988af388

    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      Filesize

      420KB

      MD5

      ada0cbc54989b2cd2959601c7a5b8499

      SHA1

      9c8739d476016fe0a87b176bb95f3a5bcbeff0de

      SHA256

      a19b89ddc700357e618934775fd1a412401b308a9ef6ae686d3f363622065c96

      SHA512

      f9de42724ff8bc65841db07a0901b706cf5f44d6c1e09e34ea753f88ed9746a22898993e0afe2947f8b4aa28515b428bd320bedca471b04db171776e81c4558e

    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      Filesize

      420KB

      MD5

      ada0cbc54989b2cd2959601c7a5b8499

      SHA1

      9c8739d476016fe0a87b176bb95f3a5bcbeff0de

      SHA256

      a19b89ddc700357e618934775fd1a412401b308a9ef6ae686d3f363622065c96

      SHA512

      f9de42724ff8bc65841db07a0901b706cf5f44d6c1e09e34ea753f88ed9746a22898993e0afe2947f8b4aa28515b428bd320bedca471b04db171776e81c4558e

    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      Filesize

      420KB

      MD5

      ada0cbc54989b2cd2959601c7a5b8499

      SHA1

      9c8739d476016fe0a87b176bb95f3a5bcbeff0de

      SHA256

      a19b89ddc700357e618934775fd1a412401b308a9ef6ae686d3f363622065c96

      SHA512

      f9de42724ff8bc65841db07a0901b706cf5f44d6c1e09e34ea753f88ed9746a22898993e0afe2947f8b4aa28515b428bd320bedca471b04db171776e81c4558e

    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      Filesize

      420KB

      MD5

      ada0cbc54989b2cd2959601c7a5b8499

      SHA1

      9c8739d476016fe0a87b176bb95f3a5bcbeff0de

      SHA256

      a19b89ddc700357e618934775fd1a412401b308a9ef6ae686d3f363622065c96

      SHA512

      f9de42724ff8bc65841db07a0901b706cf5f44d6c1e09e34ea753f88ed9746a22898993e0afe2947f8b4aa28515b428bd320bedca471b04db171776e81c4558e

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\VCRUNTIME140.dll
      Filesize

      94KB

      MD5

      11d9ac94e8cb17bd23dea89f8e757f18

      SHA1

      d4fb80a512486821ad320c4fd67abcae63005158

      SHA256

      e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e

      SHA512

      aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\VCRUNTIME140.dll
      Filesize

      94KB

      MD5

      11d9ac94e8cb17bd23dea89f8e757f18

      SHA1

      d4fb80a512486821ad320c4fd67abcae63005158

      SHA256

      e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e

      SHA512

      aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_bz2.pyd
      Filesize

      84KB

      MD5

      124678d21d4b747ec6f1e77357393dd6

      SHA1

      dbfb53c40d68eba436934b01ebe4f8ee925e1f8e

      SHA256

      9483c4853ca1da3c5b2310dbdd3b835a44df6066620278aa96b2e665c4b4e86b

      SHA512

      2882779b88ed48af1e27c2bc212ddc7e4187d26a28a90655cef98dd44bc07cc93da5bce2442af26d7825639590b1e2b78bf619d50736d67164726a342be348fa

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_bz2.pyd
      Filesize

      84KB

      MD5

      124678d21d4b747ec6f1e77357393dd6

      SHA1

      dbfb53c40d68eba436934b01ebe4f8ee925e1f8e

      SHA256

      9483c4853ca1da3c5b2310dbdd3b835a44df6066620278aa96b2e665c4b4e86b

      SHA512

      2882779b88ed48af1e27c2bc212ddc7e4187d26a28a90655cef98dd44bc07cc93da5bce2442af26d7825639590b1e2b78bf619d50736d67164726a342be348fa

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_ctypes.pyd
      Filesize

      123KB

      MD5

      7ab242d7c026dad5e5837b4579bd4eda

      SHA1

      b3ff01b8b3da2b3a9c37bfffafc4fb9ee957cc0f

      SHA256

      1548506345d220d68e9089b9a68b42a9d796141eb6236e600283951cb206eaa1

      SHA512

      1dd09cf14c87f60b42e5e56d0104154513902c9bfa23eef76a92f4a96c2356b2812dd6eee5e9a74d5ed078ade5f8f6d1f1b01961d7efadfebb543d71c2d31a30

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_ctypes.pyd
      Filesize

      123KB

      MD5

      7ab242d7c026dad5e5837b4579bd4eda

      SHA1

      b3ff01b8b3da2b3a9c37bfffafc4fb9ee957cc0f

      SHA256

      1548506345d220d68e9089b9a68b42a9d796141eb6236e600283951cb206eaa1

      SHA512

      1dd09cf14c87f60b42e5e56d0104154513902c9bfa23eef76a92f4a96c2356b2812dd6eee5e9a74d5ed078ade5f8f6d1f1b01961d7efadfebb543d71c2d31a30

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_hashlib.pyd
      Filesize

      64KB

      MD5

      ae32a39887d7516223c1e7ffdc3b6911

      SHA1

      94b9055c584df9afb291b3917ff3d972b3cd2492

      SHA256

      7936413bc24307f01b90cac2d2cc19f38264d396c1ab8eda180abba2f77162eb

      SHA512

      1f17af61c917fe373f0a40f06ce2b42041447f9e314b2f003b9bd62df87c121467d14ce3f8e778d3447c4869bf381c58600c1e11656ebda6139e6196262ae17e

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_hashlib.pyd
      Filesize

      64KB

      MD5

      ae32a39887d7516223c1e7ffdc3b6911

      SHA1

      94b9055c584df9afb291b3917ff3d972b3cd2492

      SHA256

      7936413bc24307f01b90cac2d2cc19f38264d396c1ab8eda180abba2f77162eb

      SHA512

      1f17af61c917fe373f0a40f06ce2b42041447f9e314b2f003b9bd62df87c121467d14ce3f8e778d3447c4869bf381c58600c1e11656ebda6139e6196262ae17e

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_lzma.pyd
      Filesize

      159KB

      MD5

      a77c9a75ed7d9f455e896b8fb09b494c

      SHA1

      c85d30bf602d8671f6f446cdaba98de99793e481

      SHA256

      4797aaf192eb56b32ca4febd1fad5be9e01a24e42bf6af2d04fcdf74c8d36fa5

      SHA512

      4d6d93aa0347c49d3f683ee7bc91a3c570c60126c534060654891fad0391321e09b292c9386fb99f6ea2c2eca032889841fce3cab8957bb489760daac6f79e71

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_lzma.pyd
      Filesize

      159KB

      MD5

      a77c9a75ed7d9f455e896b8fb09b494c

      SHA1

      c85d30bf602d8671f6f446cdaba98de99793e481

      SHA256

      4797aaf192eb56b32ca4febd1fad5be9e01a24e42bf6af2d04fcdf74c8d36fa5

      SHA512

      4d6d93aa0347c49d3f683ee7bc91a3c570c60126c534060654891fad0391321e09b292c9386fb99f6ea2c2eca032889841fce3cab8957bb489760daac6f79e71

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_queue.pyd
      Filesize

      28KB

      MD5

      e64538868d97697d62862b52df32d81b

      SHA1

      2279c5430032ad75338bab3aa28eb554ecd4cd45

      SHA256

      b0bd6330c525b4c64d036d29a3733582928e089d99909500e8564ae139459c5f

      SHA512

      8544f5df6d621a5ff2ca26da65b49f57e19c60b4177a678a00a5feb130bf0902f780b707845b5a4dd9f12ddb673b462f77190e71cbe358db385941f0f38e4996

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_queue.pyd
      Filesize

      28KB

      MD5

      e64538868d97697d62862b52df32d81b

      SHA1

      2279c5430032ad75338bab3aa28eb554ecd4cd45

      SHA256

      b0bd6330c525b4c64d036d29a3733582928e089d99909500e8564ae139459c5f

      SHA512

      8544f5df6d621a5ff2ca26da65b49f57e19c60b4177a678a00a5feb130bf0902f780b707845b5a4dd9f12ddb673b462f77190e71cbe358db385941f0f38e4996

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_socket.pyd
      Filesize

      78KB

      MD5

      4b2f1faab9e55a65afa05f407c92cab4

      SHA1

      1e5091b09fc0305cf29ec2e715088e7f46ccbbd4

      SHA256

      241db349093604ab25405402ba8c4212016657c7e6a10edd3110abeb1cc2e1ba

      SHA512

      68070db39cd14841bcd49db1acf19806b0aa4b4ac4c56518b3a3baddaac1cd533f0b3ef70a378f53d65c0d6c0f745a6102b63303ea7978c79f688c787efe9cc3

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_socket.pyd
      Filesize

      78KB

      MD5

      4b2f1faab9e55a65afa05f407c92cab4

      SHA1

      1e5091b09fc0305cf29ec2e715088e7f46ccbbd4

      SHA256

      241db349093604ab25405402ba8c4212016657c7e6a10edd3110abeb1cc2e1ba

      SHA512

      68070db39cd14841bcd49db1acf19806b0aa4b4ac4c56518b3a3baddaac1cd533f0b3ef70a378f53d65c0d6c0f745a6102b63303ea7978c79f688c787efe9cc3

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_ssl.pyd
      Filesize

      151KB

      MD5

      6f52439450ad38bf940eef2b662e4234

      SHA1

      3dea643fac7e10cae16c6976982a626dd59ff64a

      SHA256

      31c95af04a76d3badbdd3970d9b4c6b9a72278e69d0d850a4710f1d9a01618d7

      SHA512

      fdd97e04f4a7b1814c2f904029dfb5cdfcd8a125fce884dcd6fdb09fb8a691963192192f22cf4e9d79dd2598cf097a8764aeec7a79e70a9795250c8ef0024474

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_ssl.pyd
      Filesize

      151KB

      MD5

      6f52439450ad38bf940eef2b662e4234

      SHA1

      3dea643fac7e10cae16c6976982a626dd59ff64a

      SHA256

      31c95af04a76d3badbdd3970d9b4c6b9a72278e69d0d850a4710f1d9a01618d7

      SHA512

      fdd97e04f4a7b1814c2f904029dfb5cdfcd8a125fce884dcd6fdb09fb8a691963192192f22cf4e9d79dd2598cf097a8764aeec7a79e70a9795250c8ef0024474

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_uuid.pyd
      Filesize

      23KB

      MD5

      4b12242f880989cb909246c19616e82f

      SHA1

      df1c6459959b040babf21c2ec2ee765ce6103086

      SHA256

      02e05c2dc07b699fb7e6178526d6f32127e8d9b7aed0720446d186824d4fd1db

      SHA512

      2b3df39d886981fa123420c256a97ce075a4f7c6728a4f0e15615b9b7f3f0bad6cbbf46c4d417afa25ab8cdf50303a1209677827ed4877494cfac8f6494d263e

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\_uuid.pyd
      Filesize

      23KB

      MD5

      4b12242f880989cb909246c19616e82f

      SHA1

      df1c6459959b040babf21c2ec2ee765ce6103086

      SHA256

      02e05c2dc07b699fb7e6178526d6f32127e8d9b7aed0720446d186824d4fd1db

      SHA512

      2b3df39d886981fa123420c256a97ce075a4f7c6728a4f0e15615b9b7f3f0bad6cbbf46c4d417afa25ab8cdf50303a1209677827ed4877494cfac8f6494d263e

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\base_library.zip
      Filesize

      764KB

      MD5

      763af828dc443048e8e8d24053a8cf78

      SHA1

      08309cf941cad8b559b851b16fd2264a79d72c06

      SHA256

      ac4f3a4a4293870e3c6e03f5e9c2e6465d9bef4790deb84b788bc62c0e27a3ec

      SHA512

      2f084e67580030a07888e246be0362d290feedcee63943d39acbb3a9ce183828b7fddd6c04eaf08321bc1f57cda471782cfc37325e5030e561f89b434c2c8323

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\certifi\cacert.pem
      Filesize

      253KB

      MD5

      3dcd08b803fbb28231e18b5d1eef4258

      SHA1

      b81ea40b943cd8a0c341f3a13e5bc05090b5a72a

      SHA256

      de2fa17c4d8ae68dc204a1b6b58b7a7a12569367cfeb8a3a4e1f377c73e83e9e

      SHA512

      9cc7106e921fbcf8c56745b38051a5a56154c600e3c553f2e64d93ec988c88b17f6d49698bdc18e3aa57ae96a79ee2c08c584c7c4c91cc6ea72db3dca6ccc2f5

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\cloudscraper\user_agent\browsers.json
      Filesize

      1.2MB

      MD5

      aa0f410a4bcf7015265186c5ecf53871

      SHA1

      b497a9e650484fa3a90c47945f3cb7a234c7b2e8

      SHA256

      a18bfa57e5fdcb8b475c6c73b13b0278aec595846882ddf8110d32cabe3f6537

      SHA512

      50d6fbd3fe1d40cefa34bc98a22dbe38e420c032034b5b9407a6b3a69598f3044e67c02eaba84ab2a46fdaed4e54e44c2a9c956a04810c35bb58dd650551525d

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\libcrypto-1_1.dll
      Filesize

      3.3MB

      MD5

      63c4f445b6998e63a1414f5765c18217

      SHA1

      8c1ac1b4290b122e62f706f7434517077974f40e

      SHA256

      664c3e52f914e351bb8a66ce2465ee0d40acab1d2a6b3167ae6acf6f1d1724d2

      SHA512

      aa7bdb3c5bc8aeefbad70d785f2468acbb88ef6e6cac175da765647030734453a2836f9658dc7ce33f6fff0de85cb701c825ef5c04018d79fa1953c8ef946afd

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\libcrypto-1_1.dll
      Filesize

      3.3MB

      MD5

      63c4f445b6998e63a1414f5765c18217

      SHA1

      8c1ac1b4290b122e62f706f7434517077974f40e

      SHA256

      664c3e52f914e351bb8a66ce2465ee0d40acab1d2a6b3167ae6acf6f1d1724d2

      SHA512

      aa7bdb3c5bc8aeefbad70d785f2468acbb88ef6e6cac175da765647030734453a2836f9658dc7ce33f6fff0de85cb701c825ef5c04018d79fa1953c8ef946afd

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\libcrypto-1_1.dll
      Filesize

      3.3MB

      MD5

      63c4f445b6998e63a1414f5765c18217

      SHA1

      8c1ac1b4290b122e62f706f7434517077974f40e

      SHA256

      664c3e52f914e351bb8a66ce2465ee0d40acab1d2a6b3167ae6acf6f1d1724d2

      SHA512

      aa7bdb3c5bc8aeefbad70d785f2468acbb88ef6e6cac175da765647030734453a2836f9658dc7ce33f6fff0de85cb701c825ef5c04018d79fa1953c8ef946afd

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\libffi-7.dll
      Filesize

      32KB

      MD5

      eef7981412be8ea459064d3090f4b3aa

      SHA1

      c60da4830ce27afc234b3c3014c583f7f0a5a925

      SHA256

      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

      SHA512

      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\libffi-7.dll
      Filesize

      32KB

      MD5

      eef7981412be8ea459064d3090f4b3aa

      SHA1

      c60da4830ce27afc234b3c3014c583f7f0a5a925

      SHA256

      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

      SHA512

      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\libssl-1_1.dll
      Filesize

      678KB

      MD5

      bd857f444ebbf147a8fcd1215efe79fc

      SHA1

      1550e0d241c27f41c63f197b1bd669591a20c15b

      SHA256

      b7c0e42c1a60a2a062b899c8d4ebd0c50ef956177ba21785ce07c517c143aeaf

      SHA512

      2b85c1521edeadf7e118610d6546fafbbad43c288a7f0f9d38d97c4423a541dfac686634cde956812916830fbb4aad8351a23d95cd490c4a5c0f628244d30f0a

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\libssl-1_1.dll
      Filesize

      678KB

      MD5

      bd857f444ebbf147a8fcd1215efe79fc

      SHA1

      1550e0d241c27f41c63f197b1bd669591a20c15b

      SHA256

      b7c0e42c1a60a2a062b899c8d4ebd0c50ef956177ba21785ce07c517c143aeaf

      SHA512

      2b85c1521edeadf7e118610d6546fafbbad43c288a7f0f9d38d97c4423a541dfac686634cde956812916830fbb4aad8351a23d95cd490c4a5c0f628244d30f0a

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\python39.dll
      Filesize

      4.3MB

      MD5

      7e9d14aa762a46bb5ebac14fbaeaa238

      SHA1

      a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9

      SHA256

      e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3

      SHA512

      280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\python39.dll
      Filesize

      4.3MB

      MD5

      7e9d14aa762a46bb5ebac14fbaeaa238

      SHA1

      a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9

      SHA256

      e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3

      SHA512

      280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\select.pyd
      Filesize

      28KB

      MD5

      f8f5a047b98309d425fd06b3b41b16e4

      SHA1

      2a44819409199b47f11d5d022e6bb1d5d1e77aea

      SHA256

      5361da714a61f99136737630d50fa4e975d76f5de75e181af73c5a23a2b49012

      SHA512

      f0a96790fcdabf02b452f5c6b27604f5a10586b4bf759994e6d636cc55335026631fa302e209a53f5e454bea03b958b6d662e0be91fa64ce187a7dc5d35a9aa9

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\select.pyd
      Filesize

      28KB

      MD5

      f8f5a047b98309d425fd06b3b41b16e4

      SHA1

      2a44819409199b47f11d5d022e6bb1d5d1e77aea

      SHA256

      5361da714a61f99136737630d50fa4e975d76f5de75e181af73c5a23a2b49012

      SHA512

      f0a96790fcdabf02b452f5c6b27604f5a10586b4bf759994e6d636cc55335026631fa302e209a53f5e454bea03b958b6d662e0be91fa64ce187a7dc5d35a9aa9

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\unicodedata.pyd
      Filesize

      1.1MB

      MD5

      87f3e3cf017614f58c89c087f63a9c95

      SHA1

      0edc1309e514f8a147d62f7e9561172f3b195cd7

      SHA256

      ba6606dcdf1db16a1f0ef94c87adf580bb816105d60cf08bc570b17312a849da

      SHA512

      73f00f44239b2744c37664dbf2b7df9c178a11aa320b9437055901746036003367067f417414382977bf8379df8738c862b69d8d36c6e6aa0b0650833052c85f

    • C:\Users\Admin\AppData\Local\Temp\_MEI23722\unicodedata.pyd
      Filesize

      1.1MB

      MD5

      87f3e3cf017614f58c89c087f63a9c95

      SHA1

      0edc1309e514f8a147d62f7e9561172f3b195cd7

      SHA256

      ba6606dcdf1db16a1f0ef94c87adf580bb816105d60cf08bc570b17312a849da

      SHA512

      73f00f44239b2744c37664dbf2b7df9c178a11aa320b9437055901746036003367067f417414382977bf8379df8738c862b69d8d36c6e6aa0b0650833052c85f

    • C:\Users\Admin\AppData\Roaming\Java.exe
      Filesize

      431KB

      MD5

      b92286e3f2309f53b8ab7fc102f5dbc4

      SHA1

      ddc06ac2bd4da46d2f4705d1ab4cc521d9ffd82e

      SHA256

      9eddf03dfe7cef57e97b1b347a26a96b181ff5758d195038be14afbbae0d4d02

      SHA512

      6d4f7f6b2cadad61b4d3b30b6dc0a9f3a34b346d7f5c00b2a0f9fc714064cc51d17ccd3cc7d53d2bb6090f7d6760ef1a796d8bd87e211b097c456bf5b38d1cb5

    • C:\Users\Admin\AppData\Roaming\Java.exe
      Filesize

      431KB

      MD5

      b92286e3f2309f53b8ab7fc102f5dbc4

      SHA1

      ddc06ac2bd4da46d2f4705d1ab4cc521d9ffd82e

      SHA256

      9eddf03dfe7cef57e97b1b347a26a96b181ff5758d195038be14afbbae0d4d02

      SHA512

      6d4f7f6b2cadad61b4d3b30b6dc0a9f3a34b346d7f5c00b2a0f9fc714064cc51d17ccd3cc7d53d2bb6090f7d6760ef1a796d8bd87e211b097c456bf5b38d1cb5

    • C:\Users\Admin\AppData\Roaming\Java.exe
      Filesize

      431KB

      MD5

      b92286e3f2309f53b8ab7fc102f5dbc4

      SHA1

      ddc06ac2bd4da46d2f4705d1ab4cc521d9ffd82e

      SHA256

      9eddf03dfe7cef57e97b1b347a26a96b181ff5758d195038be14afbbae0d4d02

      SHA512

      6d4f7f6b2cadad61b4d3b30b6dc0a9f3a34b346d7f5c00b2a0f9fc714064cc51d17ccd3cc7d53d2bb6090f7d6760ef1a796d8bd87e211b097c456bf5b38d1cb5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      Filesize

      73KB

      MD5

      8e3d99e6a1064f89744ccb24dc6802bb

      SHA1

      1b6c31ab4236538c8423c19575c1e19a031b3876

      SHA256

      d21a23ffbdfe1bf8232a132b559c99b37f5825d816f83370684e67988b3162a8

      SHA512

      f5f49c20c5d9a5a80e1d3a4540695fca4732755bc33c0ea61b8be582a2ab7d22305666caf4a3f09fc7c165b3ceadcc89aa4240edcf1f0daba8b0bb09ef720134

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      Filesize

      73KB

      MD5

      8e3d99e6a1064f89744ccb24dc6802bb

      SHA1

      1b6c31ab4236538c8423c19575c1e19a031b3876

      SHA256

      d21a23ffbdfe1bf8232a132b559c99b37f5825d816f83370684e67988b3162a8

      SHA512

      f5f49c20c5d9a5a80e1d3a4540695fca4732755bc33c0ea61b8be582a2ab7d22305666caf4a3f09fc7c165b3ceadcc89aa4240edcf1f0daba8b0bb09ef720134

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      Filesize

      73KB

      MD5

      8e3d99e6a1064f89744ccb24dc6802bb

      SHA1

      1b6c31ab4236538c8423c19575c1e19a031b3876

      SHA256

      d21a23ffbdfe1bf8232a132b559c99b37f5825d816f83370684e67988b3162a8

      SHA512

      f5f49c20c5d9a5a80e1d3a4540695fca4732755bc33c0ea61b8be582a2ab7d22305666caf4a3f09fc7c165b3ceadcc89aa4240edcf1f0daba8b0bb09ef720134

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
      Filesize

      293KB

      MD5

      1303779b354738a8c93cc522ffb21f11

      SHA1

      ce29a26e1363ddfdc830e2934fed935f15032187

      SHA256

      0a8e2fcc8c6393d2e97e6129e862a877a420a54f2530b4af5eb7f8e2a7a30af5

      SHA512

      b5a612907d09200753d4b4770c90cde98d18eda7eacd15c8297582401b58f1a4a91c8553dea7640d03bcc6068bb2afa0b1ee46997653c839f2066f5ed050a66d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
      Filesize

      293KB

      MD5

      1303779b354738a8c93cc522ffb21f11

      SHA1

      ce29a26e1363ddfdc830e2934fed935f15032187

      SHA256

      0a8e2fcc8c6393d2e97e6129e862a877a420a54f2530b4af5eb7f8e2a7a30af5

      SHA512

      b5a612907d09200753d4b4770c90cde98d18eda7eacd15c8297582401b58f1a4a91c8553dea7640d03bcc6068bb2afa0b1ee46997653c839f2066f5ed050a66d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
      Filesize

      293KB

      MD5

      1303779b354738a8c93cc522ffb21f11

      SHA1

      ce29a26e1363ddfdc830e2934fed935f15032187

      SHA256

      0a8e2fcc8c6393d2e97e6129e862a877a420a54f2530b4af5eb7f8e2a7a30af5

      SHA512

      b5a612907d09200753d4b4770c90cde98d18eda7eacd15c8297582401b58f1a4a91c8553dea7640d03bcc6068bb2afa0b1ee46997653c839f2066f5ed050a66d

    • C:\Users\Admin\AppData\Roaming\ParadoxNumber .exe
      Filesize

      7.1MB

      MD5

      430c4885c6951206ee1df0d9352877b8

      SHA1

      30560b58f0b6a2d0af856d43d0861096735de044

      SHA256

      e8cf29b493965035a415ec03b676dbe9a7a5f9810df697e50969dc2afb4f66ab

      SHA512

      4513921beb1376d9e7ade9a135ab662c716a0f384a81559adc0d731cb5c49f5931f875e0212eee4aad8ab4ff39bfcb7679ecc93780d98b245ec84c462b084077

    • C:\Users\Admin\AppData\Roaming\ParadoxNumber .exe
      Filesize

      7.1MB

      MD5

      430c4885c6951206ee1df0d9352877b8

      SHA1

      30560b58f0b6a2d0af856d43d0861096735de044

      SHA256

      e8cf29b493965035a415ec03b676dbe9a7a5f9810df697e50969dc2afb4f66ab

      SHA512

      4513921beb1376d9e7ade9a135ab662c716a0f384a81559adc0d731cb5c49f5931f875e0212eee4aad8ab4ff39bfcb7679ecc93780d98b245ec84c462b084077

    • C:\Users\Admin\AppData\Roaming\ParadoxNumber .exe
      Filesize

      7.1MB

      MD5

      430c4885c6951206ee1df0d9352877b8

      SHA1

      30560b58f0b6a2d0af856d43d0861096735de044

      SHA256

      e8cf29b493965035a415ec03b676dbe9a7a5f9810df697e50969dc2afb4f66ab

      SHA512

      4513921beb1376d9e7ade9a135ab662c716a0f384a81559adc0d731cb5c49f5931f875e0212eee4aad8ab4ff39bfcb7679ecc93780d98b245ec84c462b084077

    • C:\Users\Admin\AppData\Roaming\ParadoxNumber .exe
      Filesize

      7.1MB

      MD5

      430c4885c6951206ee1df0d9352877b8

      SHA1

      30560b58f0b6a2d0af856d43d0861096735de044

      SHA256

      e8cf29b493965035a415ec03b676dbe9a7a5f9810df697e50969dc2afb4f66ab

      SHA512

      4513921beb1376d9e7ade9a135ab662c716a0f384a81559adc0d731cb5c49f5931f875e0212eee4aad8ab4ff39bfcb7679ecc93780d98b245ec84c462b084077

    • C:\Users\Admin\AppData\Roaming\ParadoxNumber.exe
      Filesize

      7.5MB

      MD5

      bf1c1c4ac472c26293b6ff51ac4e6793

      SHA1

      d2f50cf501b79379a275ae109881dae7117cb92a

      SHA256

      29b4d43f90daf7a070ecaf6524cadf33a58eda09e889fef3ab82ca876e4cf485

      SHA512

      48695d12f02736c246be7c40822dee49a3ddb41fe2a0b3f2bb08305654edb9ebd10a70464bbb8e88ab93d9c910dc8f6ebd547536a26d7a588a85cf749e9c5d17

    • C:\Users\Admin\AppData\Roaming\ParadoxNumber.exe
      Filesize

      7.5MB

      MD5

      bf1c1c4ac472c26293b6ff51ac4e6793

      SHA1

      d2f50cf501b79379a275ae109881dae7117cb92a

      SHA256

      29b4d43f90daf7a070ecaf6524cadf33a58eda09e889fef3ab82ca876e4cf485

      SHA512

      48695d12f02736c246be7c40822dee49a3ddb41fe2a0b3f2bb08305654edb9ebd10a70464bbb8e88ab93d9c910dc8f6ebd547536a26d7a588a85cf749e9c5d17

    • C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe
      Filesize

      431KB

      MD5

      b92286e3f2309f53b8ab7fc102f5dbc4

      SHA1

      ddc06ac2bd4da46d2f4705d1ab4cc521d9ffd82e

      SHA256

      9eddf03dfe7cef57e97b1b347a26a96b181ff5758d195038be14afbbae0d4d02

      SHA512

      6d4f7f6b2cadad61b4d3b30b6dc0a9f3a34b346d7f5c00b2a0f9fc714064cc51d17ccd3cc7d53d2bb6090f7d6760ef1a796d8bd87e211b097c456bf5b38d1cb5

    • C:\Users\Admin\AppData\Roaming\RuntimeBroker.exe
      Filesize

      431KB

      MD5

      b92286e3f2309f53b8ab7fc102f5dbc4

      SHA1

      ddc06ac2bd4da46d2f4705d1ab4cc521d9ffd82e

      SHA256

      9eddf03dfe7cef57e97b1b347a26a96b181ff5758d195038be14afbbae0d4d02

      SHA512

      6d4f7f6b2cadad61b4d3b30b6dc0a9f3a34b346d7f5c00b2a0f9fc714064cc51d17ccd3cc7d53d2bb6090f7d6760ef1a796d8bd87e211b097c456bf5b38d1cb5

    • memory/380-158-0x0000000000BB0000-0x0000000000C1E000-memory.dmp
      Filesize

      440KB

    • memory/380-159-0x0000000001500000-0x0000000001528000-memory.dmp
      Filesize

      160KB

    • memory/380-176-0x0000000001480000-0x0000000001490000-memory.dmp
      Filesize

      64KB

    • memory/2856-274-0x0000000000C40000-0x0000000000C58000-memory.dmp
      Filesize

      96KB

    • memory/2856-282-0x0000000001290000-0x00000000012A0000-memory.dmp
      Filesize

      64KB

    • memory/2856-278-0x000000001D6B0000-0x000000001D712000-memory.dmp
      Filesize

      392KB

    • memory/2856-277-0x0000000001430000-0x000000000143C000-memory.dmp
      Filesize

      48KB

    • memory/2856-276-0x0000000001290000-0x00000000012A0000-memory.dmp
      Filesize

      64KB

    • memory/2856-275-0x00000000012D0000-0x00000000012D8000-memory.dmp
      Filesize

      32KB

    • memory/3368-177-0x0000000001510000-0x0000000001520000-memory.dmp
      Filesize

      64KB

    • memory/3544-209-0x0000000000600000-0x000000000064E000-memory.dmp
      Filesize

      312KB

    • memory/3644-210-0x0000000001180000-0x0000000001188000-memory.dmp
      Filesize

      32KB

    • memory/3692-138-0x0000000000EC0000-0x0000000000F32000-memory.dmp
      Filesize

      456KB

    • memory/3904-142-0x0000000000340000-0x0000000000AD0000-memory.dmp
      Filesize

      7.6MB

    • memory/3904-146-0x000000001C480000-0x000000001C51C000-memory.dmp
      Filesize

      624KB

    • memory/3904-145-0x000000001BF10000-0x000000001C3DE000-memory.dmp
      Filesize

      4.8MB

    • memory/3904-144-0x0000000001590000-0x00000000015A0000-memory.dmp
      Filesize

      64KB

    • memory/3904-143-0x000000001B980000-0x000000001BA26000-memory.dmp
      Filesize

      664KB

    • memory/4928-280-0x000000001D350000-0x000000001D360000-memory.dmp
      Filesize

      64KB

    • memory/4928-283-0x000000001D350000-0x000000001D360000-memory.dmp
      Filesize

      64KB