Malware Analysis Report

2024-11-30 12:27

Sample ID 231004-m7vzgada54
Target windowshosts.exe
SHA256 1f3b50a1f9d7d1c29c8cbf57e5a637c84cf7c51eae79e041269e6cb085260df8
Tags
persistence spyware stealer upx pyinstaller pysilon
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1f3b50a1f9d7d1c29c8cbf57e5a637c84cf7c51eae79e041269e6cb085260df8

Threat Level: Known bad

The file windowshosts.exe was found to be: Known bad.

Malicious Activity Summary

persistence spyware stealer upx pyinstaller pysilon

Detect Pysilon

Pysilon family

Enumerates VirtualBox DLL files

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

UPX packed file

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

Looks up external IP address via web service

Unsigned PE

Detects Pyinstaller

Suspicious behavior: EnumeratesProcesses

Kills process with taskkill

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Gathers system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-10-04 11:07

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-04 11:06

Reported

2023-10-04 11:10

Platform

win10v2004-20230915-en

Max time kernel

149s

Max time network

158s

Command Line

"C:\Users\Admin\AppData\Local\Temp\windowshosts.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\JustBad\JustBadLoader.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\JustBad\JustBadLoader.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\JustBad\JustBadLoader.exe N/A
N/A N/A C:\Users\Admin\JustBad\JustBadLoader.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hwidHashed = "C:\\Users\\Admin\\JustBad\\JustBadLoader.exe" C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Description Indicator Process Target
N/A ident.me N/A N/A
N/A ident.me N/A N/A

Gathers system information

Description Indicator Process Target
N/A N/A C:\Windows\system32\systeminfo.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\JustBad\JustBadLoader.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\JustBad\JustBadLoader.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\JustBad\JustBadLoader.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2504 wrote to memory of 3688 N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe C:\Users\Admin\AppData\Local\Temp\windowshosts.exe
PID 2504 wrote to memory of 3688 N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe C:\Users\Admin\AppData\Local\Temp\windowshosts.exe
PID 3688 wrote to memory of 4572 N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe C:\Windows\system32\cmd.exe
PID 3688 wrote to memory of 4572 N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe C:\Windows\system32\cmd.exe
PID 3688 wrote to memory of 3516 N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3688 wrote to memory of 3516 N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3688 wrote to memory of 4016 N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe C:\Windows\system32\cmd.exe
PID 3688 wrote to memory of 4016 N/A C:\Users\Admin\AppData\Local\Temp\windowshosts.exe C:\Windows\system32\cmd.exe
PID 4016 wrote to memory of 3644 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\JustBad\JustBadLoader.exe
PID 4016 wrote to memory of 3644 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\JustBad\JustBadLoader.exe
PID 4016 wrote to memory of 4188 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 4016 wrote to memory of 4188 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 3644 wrote to memory of 3976 N/A C:\Users\Admin\JustBad\JustBadLoader.exe C:\Users\Admin\JustBad\JustBadLoader.exe
PID 3644 wrote to memory of 3976 N/A C:\Users\Admin\JustBad\JustBadLoader.exe C:\Users\Admin\JustBad\JustBadLoader.exe
PID 3976 wrote to memory of 3820 N/A C:\Users\Admin\JustBad\JustBadLoader.exe C:\Windows\system32\cmd.exe
PID 3976 wrote to memory of 3820 N/A C:\Users\Admin\JustBad\JustBadLoader.exe C:\Windows\system32\cmd.exe
PID 3976 wrote to memory of 3952 N/A C:\Users\Admin\JustBad\JustBadLoader.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3976 wrote to memory of 3952 N/A C:\Users\Admin\JustBad\JustBadLoader.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3976 wrote to memory of 4672 N/A C:\Users\Admin\JustBad\JustBadLoader.exe C:\Windows\system32\cmd.exe
PID 3976 wrote to memory of 4672 N/A C:\Users\Admin\JustBad\JustBadLoader.exe C:\Windows\system32\cmd.exe
PID 4672 wrote to memory of 1624 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4672 wrote to memory of 1624 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 3976 wrote to memory of 1960 N/A C:\Users\Admin\JustBad\JustBadLoader.exe C:\Windows\system32\cmd.exe
PID 3976 wrote to memory of 1960 N/A C:\Users\Admin\JustBad\JustBadLoader.exe C:\Windows\system32\cmd.exe
PID 1960 wrote to memory of 2436 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\systeminfo.exe
PID 1960 wrote to memory of 2436 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\systeminfo.exe

Processes

C:\Users\Admin\AppData\Local\Temp\windowshosts.exe

"C:\Users\Admin\AppData\Local\Temp\windowshosts.exe"

C:\Users\Admin\AppData\Local\Temp\windowshosts.exe

"C:\Users\Admin\AppData\Local\Temp\windowshosts.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x518 0x4f8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\JustBad\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\JustBad\activate.bat

C:\Users\Admin\JustBad\JustBadLoader.exe

"JustBadLoader.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "windowshosts.exe"

C:\Users\Admin\JustBad\JustBadLoader.exe

"JustBadLoader.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\JustBad\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "systeminfo"

C:\Windows\system32\systeminfo.exe

systeminfo

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 54.120.234.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 203.33.253.131.in-addr.arpa udp
US 8.8.8.8:53 240.81.21.72.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.136.232:443 discord.com tcp
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.133.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
N/A 127.0.0.1:58573 tcp
US 8.8.8.8:53 234.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 ident.me udp
DE 49.12.234.183:443 ident.me tcp
US 8.8.8.8:53 ipv4.lafibre.info udp
US 8.8.8.8:53 183.234.12.49.in-addr.arpa udp
NL 51.158.154.169:443 ipv4.lafibre.info tcp
US 8.8.8.8:53 169.154.158.51.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 23.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI25042\ucrtbase.dll

MD5 0e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA1 4189f4459c54e69c6d3155a82524bda7549a75a6
SHA256 8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512 a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

C:\Users\Admin\AppData\Local\Temp\_MEI25042\python311.dll

MD5 5f6fd64ec2d7d73ae49c34dd12cedb23
SHA1 c6e0385a868f3153a6e8879527749db52dce4125
SHA256 ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967
SHA512 c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab

C:\Users\Admin\AppData\Local\Temp\_MEI25042\ucrtbase.dll

MD5 0e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA1 4189f4459c54e69c6d3155a82524bda7549a75a6
SHA256 8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512 a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

C:\Users\Admin\AppData\Local\Temp\_MEI25042\python311.dll

MD5 5f6fd64ec2d7d73ae49c34dd12cedb23
SHA1 c6e0385a868f3153a6e8879527749db52dce4125
SHA256 ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967
SHA512 c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab

C:\Users\Admin\AppData\Local\Temp\_MEI25042\VCRUNTIME140.dll

MD5 49c96cecda5c6c660a107d378fdfc3d4
SHA1 00149b7a66723e3f0310f139489fe172f818ca8e
SHA256 69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512 e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

C:\Users\Admin\AppData\Local\Temp\_MEI25042\VCRUNTIME140.dll

MD5 49c96cecda5c6c660a107d378fdfc3d4
SHA1 00149b7a66723e3f0310f139489fe172f818ca8e
SHA256 69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512 e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

memory/3688-1294-0x00007FFA1EF70000-0x00007FFA1F559000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI25042\python3.dll

MD5 0e105f62fdd1ff4157560fe38512220b
SHA1 99bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256 803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA512 59c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de

C:\Users\Admin\AppData\Local\Temp\_MEI25042\python3.DLL

MD5 0e105f62fdd1ff4157560fe38512220b
SHA1 99bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256 803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA512 59c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de

C:\Users\Admin\AppData\Local\Temp\_MEI25042\libffi-8.dll

MD5 08b000c3d990bc018fcb91a1e175e06e
SHA1 bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256 135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA512 8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

C:\Users\Admin\AppData\Local\Temp\_MEI25042\_lzma.pyd

MD5 542eab18252d569c8abef7c58d303547
SHA1 05eff580466553f4687ae43acba8db3757c08151
SHA256 d2a7111feeaacac8b3a71727482565c46141cc7a5a3d837d8349166bea5054c9
SHA512 b7897b82f1aa9d5aa895c3de810dab1aa335fdf7223e4ff29b32340ad350d9be6b145f95a71c7bc7c88c8df77c3f04853ae4d6f0d5a289721fc1468ecba3f958

C:\Users\Admin\AppData\Local\Temp\_MEI25042\libogg-0.dll

MD5 6ffebd7d283079e9029c7f29d8ca7fba
SHA1 b470b09c8aa2f3e42bcff8392d95b6259cb87555
SHA256 0d9a915ea29ed4da271f86dbcfa90b52064a26b5136af590b2bb430d5dd6a67e
SHA512 2b9a9b5f298eefccf0a08af52d7c2c803db19ab9f3cedad2bb19df50466527c05e31f956b6018c9a337565448249465eba8952e9e8397b728b7f76e4f0561c68

memory/3688-1355-0x00007FFA1EF40000-0x00007FFA1EF6D000-memory.dmp

memory/3688-1354-0x00007FFA345C0000-0x00007FFA345CF000-memory.dmp

memory/3688-1357-0x00007FFA282B0000-0x00007FFA282C9000-memory.dmp

memory/3688-1358-0x00007FFA1EF20000-0x00007FFA1EF34000-memory.dmp

memory/3688-1356-0x00007FFA1EA00000-0x00007FFA1EF20000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI25042\libmodplug-1.dll

MD5 072093b2671589d4ce465de2b92ebee4
SHA1 821d9827286271859640984df28e01b4a37341fb
SHA256 04d07b4dcae8d3998156d563df20881ba790c32389aca23ade91de9cf9f4a3d4
SHA512 522d5faa8d17017f1891374a23d6e653cd62b51818734bf1f7343248d09e1e314ae49821595818fe69af62c9e51debca4ae384e421ad8fa658aced95f977379e

C:\Users\Admin\AppData\Local\Temp\_MEI25042\libjpeg-9.dll

MD5 6e67e46f957f50215b7e68c9091db53f
SHA1 e969fa4858351c95c337352dd0578fe5a83403f0
SHA256 24b25fe9ebe303496973c4d11144b053a5f5a03eabf53f9d8eab0c15fdbfbffe
SHA512 86af5560269ef21490f5343ea3e0522f35e271d42e64f61a2f05471302856de79d34bf00658e1667d7145af48667627fa3897bca2fc479928ab9a62ecba81396

C:\Users\Admin\AppData\Local\Temp\_MEI25042\libcrypto-3.dll

MD5 78ebd9cb6709d939e4e0f2a6bbb80da9
SHA1 ea5d7307e781bc1fa0a2d098472e6ea639d87b73
SHA256 6a8c458e3d96f8dd3bf6d3cacc035e38edf7f127eee5563b51f8c8790ced0b3e
SHA512 b752769b3de4b78905b0326b5270091642ac89ff204e9e4d78670791a1fa211a54d777aeef59776c21f854c263add163adaef6a81b166190518cfaaf4e2e4122

C:\Users\Admin\AppData\Local\Temp\_MEI25042\freetype.dll

MD5 522257e451efcc3bfe980f56d3fed113
SHA1 f5e12321517f523842943ea7f3ba74d449dba1f4
SHA256 8c74376e7932eebcd084191b40774056b32525ba48e375d942754cdc4fc03c60
SHA512 d590cd813281278be4aec86af3713216dd306399b4910221a2447a3200accbca1b5f8d9495bf21f69ff8e09e5465a71c715a85ce0d87cdc26cbf27b0fae2cc4c

C:\Users\Admin\AppData\Local\Temp\_MEI25042\crypto_clipper.json

MD5 28ace1f269a7b6ddc508fe2ef995eb89
SHA1 fc25b159929682bff11e6d3b413acba80300418a
SHA256 8011959661b3c6efee432bdc16b358de1c371aaccdbec068c9e65004262f988e
SHA512 4c1172eead25d9c6037729ad372975d545153213dba99e7308308f1f1c6594bb1322b6c1332e44bd3677458160211046762a5dbf72564e4c7d36f7371177dcd2

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-utility-l1-1-0.dll

MD5 57d3ee548db3a503ac391af798e0e2a2
SHA1 d686a96c5046d6d7a022c4266a5d0014745360a4
SHA256 2c80280e51c242466e10a36a0bf2a341607983b6f6648f93b0718b34ab5285c5
SHA512 f3ea9c8f2f230d23bc878e37044599b2c77f0bf6dd84b07c2f87a84263fb9ac7f44732f05e14781b6046afb2a39f27135c96d2da2ab9605bd00e55d9b0fffb0b

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-time-l1-1-0.dll

MD5 816a8932759bdb478d4263cacbf972e3
SHA1 ac9f2bed41e340313501aa7d33dcd369748f0496
SHA256 ce9a8e18923d12e2f62ce2a20693113000fc361cc816773037c155c273b99e7c
SHA512 5144f01bee04455d5b9a7b07e62f4afb928605331213eb483265016640198c175dc08673903ed5bc16b385ee76657aa4303776233d04347d9d1daadce39525c4

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-string-l1-1-0.dll

MD5 f9297b9ff06295bc07b7e5281b1face0
SHA1 d0eb0fddbb3eb187df0f0e5f9ddffcfc2e05f9b7
SHA256 c56a2ee0cc6dc1e7283b9bda8b7b2dba957329cb4bc9aca4cd99f88e108f9c04
SHA512 bec6222776015996eba744698d3254945dfe4bb4dc0d85528ee59a0f3b5fc5bb054bbf496d562cfc7b4cc81b4d3df5c53761931162a0091a49386233afba4f9c

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-stdio-l1-1-0.dll

MD5 8341f0371e25b8077fe61c89a9ef8144
SHA1 fc185203e33abed12e1398440cb2ee283ca9541a
SHA256 bd9a5d4554ef1a374257e8dd9436d89f686006ed1fd1cc44364b237bf5b795ff
SHA512 9c7e4e8d8e9e620f441ab5106820ec021d2b2323f44ed8cc8ec9673745dbc531347356f1ff195d63b62b09cc5c27e8f8641ce25be12ee9b700b5fc766337228b

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-runtime-l1-1-0.dll

MD5 364bc49cc7034f8a9981ade1ce565229
SHA1 fbd76c1842d1ccf563ece2db32fff4c71e7ca689
SHA256 6254fd07ace88685112e3a7b73676aabf13a1b1bc30c55dd976b34fea12b7f1d
SHA512 65e59e3358eb1bf26823c9538c74d343e7383591c021d2b340ef68aa9a274d65b15b30bbbe55f4b32e3a08fc79d4e179a6ce92eadb8c4be09a2c35c348ce10af

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-process-l1-1-0.dll

MD5 e3914d51afd864a6c6587aa9192c491b
SHA1 bae85701809bc259a8744aafa45cd7159e6c13f8
SHA256 28257cc063431f78284335ce3002ffb71b75c1e7ccabf5417bb42392c35564b4
SHA512 43b1445a80d309ec73d52d6cf68f4533a132fb55ab672e5e2a878bb42c1cb36d6e4c504d43fa4923e692c8be600f3f9d5a5edde80602636cb726eedfca23dfb8

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-private-l1-1-0.dll

MD5 2e25e89a72ed18ba5d246bc525805de4
SHA1 63a1a4315e0d3f5b238dbc846d3e3c1492f18d06
SHA256 462c97364a7b6fcd5e4308c3e6971b696edb6a03c38a2df5049c1f0df2006d35
SHA512 4a47c9f44f61c68de721627027e88fa0cdf07830f024aeeaf5feb8a4618b37841bf01d9f456641ff97bcabf82de125ae0bd3482e4cb8d148fcb1898e2a7dd647

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-multibyte-l1-1-0.dll

MD5 0b057fa3a94c782da362d225c5974d12
SHA1 ca27a53ff2be1250e33045989e0fb515dfdfe3f3
SHA256 e1c519fef1622d35a05dd60e6464492f7b8ee6bbceee01563db82be66edb1346
SHA512 2dc6ef4d2d1f1bc050cba52e1a96242468fa25372f216e399163bce2e5e17c4911e097106f5727db4379c9fb603091b32f1e818695b362596037d7a6f43e06c7

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-math-l1-1-0.dll

MD5 a592d1b2ecc42d1a083f0d34feae2444
SHA1 29718af390f832626fcdcc57c107333cdb5743e1
SHA256 18a827b01de7b1a3d5c8d17b79ad2462a90308124448a9b8c47eccda39c3a095
SHA512 44bed6d24f1fa35b10d2b2b1574e7baf10182e60fdcb6cba5dd9de5cd7a5183198925e4fa5a7e2896564a30f7b70de69691713118d59bf5162ce35aff5bcf7a6

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-locale-l1-1-0.dll

MD5 75f1a5f65790560d9544f3fb70efba51
SHA1 f30a5751901cfffc250be76e13a8b711ebc06bcc
SHA256 e0e02ea6c17da186e25e352b78c80b1b3511b5c1590e5ba647b14a7b384af0f8
SHA512 b7e285ca35f6a8ae2ccbe21594d72152175301a02ad6b92fe130e1e226a0faad1bfad1bd49857401549c09b50feee2c42c23ca4c19b2845cad090f5b9e8e8f63

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-heap-l1-1-0.dll

MD5 4b038cdc70357d2dec440717ac344a52
SHA1 f67ba87f6830858845a5763381a47893af061bf8
SHA256 6a24e9cfb0efd9e1b90053d4ebd87fc35144e61ae3f6555c7d400542d648e2b5
SHA512 9557f15fa3c06de89ea8be0c959b94575a1c4587151687730f9e66fed095feb882d43ea32262000f871e6d860ce0c6c341cf5509a6ce81866f6d0efacb8526fe

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 102a8c01049ef18cc6e8798a9e5d57f4
SHA1 9adef547e03032d8c5525cc9c7d4512fbeb53948
SHA256 e13edab280e7b3410d7f4ce30a8e8cae64f38652d770fc3bf223206f0c57aaa5
SHA512 a9fbc726f33399f55f70967f3f1bf374589eaad9581d9e94228d39afa06cdce31ed25bdc04805aad361c7cafbeb56ca39f6693259d67457199d4423a61b32263

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-environment-l1-1-0.dll

MD5 e41612752a7dfbbe756322cf48e106b9
SHA1 0ec106e926c9837a43e1d7ec8d1a5f03edd5ec3d
SHA256 4bb9d36e0e034652f2331ddb43ee061608f436cbc9e5771b4d27b28fa10f5248
SHA512 9bed9399e896d1cc58cc06e8d7ec6cc3345be6d15ca307c670e0f282c9ebe48a6cc1b145c2ecf94d84214cddff8f0d0d720ea984478c74c98e2499c2184638c9

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-convert-l1-1-0.dll

MD5 87e2934e49d7d111f383673f97d5029e
SHA1 267603d5510b775de3667f7d92bfaa3bd60e6533
SHA256 fb9dd774b25ab8e661c922caffb976c37a4d10a631ab65665da60016ef0c4d7c
SHA512 e6025ad419359ad3e06cc7a3b3b7436464dbbc71b91653833575264a5f8b0d781844a411bcd915d404b9a8c0a056eaf6d4d412723936845b53bfb5368bf5f7a7

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-crt-conio-l1-1-0.dll

MD5 9eb2c06decaae1a109a94886a26eec25
SHA1 307ce096bee44f54a6d37aab1ef123fb423ed028
SHA256 da8fd2fe08a531d2331c1fbee9f4ae9015b64f24a2654a7f82418c86b4ab6909
SHA512 7e701cb00a4cab8d5b3ecf55a16fef0103f9be1aa3fd7b53c7bab968708c21e8d1c763ad80a7a8d6c76dd45ddd244c9c9e8944455c2025b4195660b61ac1e8b7

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-util-l1-1-0.dll

MD5 f7fdc91ac711a9bb3391901957a25cea
SHA1 1cebc5497e15051249c951677b5b550a1770c24f
SHA256 de47c1f924dc12e41d3a123b7dcce0260e7758b90fb95ec95c270fc116fc7599
SHA512 0e03c998622d6bf113e8d3b4dab728974391efecf59df89f938bd22240488e71885c05fb0fa805948b3d9645758409a0966299b26625aa36e3fd6e519ee22769

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-timezone-l1-1-0.dll

MD5 b9a20c9223d3e3d3a0c359f001ce1046
SHA1 9710b9a8c393ba00c254cf693c7c37990c447cc8
SHA256 00d9a7353be0a54c17e4862b86196a8b2bc6a007899fa2fbe61afd9765548068
SHA512 a7d5611c0b3b53da6cac61e0374d54d27e6e8a1af90ef66cd7e1b052f906c8b3f6087f4c6de0db3ae0b099df7689ecde6c815a954b728d36d9d3b5d002ccf18e

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 e4893842d031b98cac1c6f754a2a3f8d
SHA1 2b0187134e40d27553a85dd4ec89dd6c40e58a24
SHA256 abe4c1464b325365d38e0bc4ae729a17a7f6f7ba482935c66e6840e1b0d126c5
SHA512 fc61a66fdc7213857f204bd0b20671db7092e0010e07b5e0e8e8408ace8ac5b6e696a7d9fc969233b2b3ad5dae4d3b291b007ff27a316e7fb750bfc93257c532

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-synch-l1-2-0.dll

MD5 b962237df7ea045c325e7f97938097cb
SHA1 1115e0e13ecc177d057e3d1c9644ac4d108f780a
SHA256 a24dd6afdb4c4aa450ae4bc6a2861a49032170661b9c1f30cd0460c5dc57e0f7
SHA512 19ac4cccaaa59fbae042d03ba52d89f309bd2591b035f3ec3df430ff399d650fcf9c4d897834a520dea60dc0562a8a6f7d25a1fffcd32f765a4eaffe4c7d5ea2

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-synch-l1-1-0.dll

MD5 bccc676f2fb18c1a1864363e5a649a88
SHA1 a095a83a32a4a65fe16aa0be9a517239fac5db0d
SHA256 9d3f803dc791d2ff2e05059f9bb9207cc8f4134e1ac05f20edd20cfadd6e72c0
SHA512 55aab9fa6f7c4904e4beea4ce250f45fb71c2dd6a6f099f4017101ebc45c0a6e303b6a222f49c971992cafe8988a042b7ef8e94671be858c926105021514737a

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-string-l1-1-0.dll

MD5 b65933f7bcadc7072d5a2d70ecba9f81
SHA1 c53561755b9f33d0ae7874b3a7d67bedcb0129d8
SHA256 eadf535795df58d4f52fc6237fe46feb0f8166daca5eaaa59cec3cee50a9181d
SHA512 4cbb8bda8609404fe84ca36a8cbfe1d69c55dee2b969231b2fa00ca9139d956196a2babbb80a1a2bb430a34e6bd335294f452bcbe9e44411561ebdf21e4aba91

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 0b30c6862b5224cc429fe2eb2b7bf14b
SHA1 5c3affa14e3bfdafe09e9841a2920b57c7fcbc56
SHA256 d9c6f93c4972db08c7888d55e8e59e8aba022d416817d65bc96e5a258c859b5f
SHA512 b378f2a2812245ea948d81a925d041dbd7e7a8fb2770cf7dd47643da20f5c685c6121479f95b293177a9480290b17c49e7b4fc10d33734cf883d2c614daae1bf

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-profile-l1-1-0.dll

MD5 1be729c6d9bf1b58f435b23e7f87ba49
SHA1 4b2df3fab46a362ee46057c344995fa622e0672a
SHA256 4c425fbb8d2319d838733ab9cec63a576639192d993909e70cf84f49c107f785
SHA512 ceccc5ff2bd90a91cfbb948f979576795ff0a9503ddaafd268c14306f93d887975bd376b62ed688be51bb88b3a0c54ef332be93b4b0d8737b5ab70a661b11416

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-processthreads-l1-1-1.dll

MD5 774aa9f9318880cb4ad3bf6f464da556
SHA1 3a5c07cf35009c98eb033e1cbde1900135d1abf8
SHA256 ba9fbd3a21879614c050c86a74ad2fffc0362266d6fa7be0ef359de393136346
SHA512 f7b57afb9810e3390d27a5469572fb29f0f1726f599403a180e685466237dff5dec4fdce40105ef1bb057e012d546308213e7cec73e0d7d3c5815eec8189a75d

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-processthreads-l1-1-0.dll

MD5 73586decad3b3d90653750504b356a5c
SHA1 39a7ee1660ca1291314ef78150e397b1d8683e03
SHA256 34f560c3e56f40db5df695c967b6e302e961085bc037bb9a1c2d2c866a9df48f
SHA512 9ec299e930d2b89ad379613f8fa63669ec7c858da8a24608b92175f42b0be75f8aa2e1727dabf7638ae9d2942d03840f288eab53f2c9f38dbea1325f1ea8b22b

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 4f1303827a67760d02feb54e9258edb1
SHA1 340d7029c39708d14da79b12a0e2ed0a8bc7c020
SHA256 77fc9adf1a734d9717700b038b98b4337a494fc4f7e1e706c82e97dbca896fd8
SHA512 20f067d1c2749c709e4fc45da8d9eb5b813f54d0e09fa482d00bc4a7e5744c587d0afc00cdd5263b4223fe94baa3f8ca110d010339f9e3f1c6b2700888dbe3d0

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 d1bc9b3a7aa94d10c41fa16210aa9dba
SHA1 a358b824b1f26ead420d2100e5f1a3fb74af2b7a
SHA256 75652caf05e86adc88ed214fd208b4a289489cac2b28fd358e302e2e7c3c338f
SHA512 149478dfca0165d5a68e89070017cda3400926284eaa2143a810138ff710079cde413c031721de5b58cb834f03d4c5df5b4bd6c2bdb65687755ad77cae778b30

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-memory-l1-1-0.dll

MD5 064fb2e1b5e90796a68d1edf91269ad3
SHA1 6e3a8c568f038879b7b102975a4471b2489f5493
SHA256 3500935e638f7d0ae2bf564bf77f9329811329261185fcdb9cd702b999889ffd
SHA512 821f091529d45531811a73664473cebb372a310d855e1a4c1a028ad4dc7d36146d3030dcf10de8a4a4bf16fb535fe3d0d2e1fcd22959690842388abb177b0036

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-localization-l1-2-0.dll

MD5 3589557535bba7641da3d76eefb0c73d
SHA1 6f63107c2212300c7cd1573059c08b43e5bd9b95
SHA256 642b01bb93d2cb529acf56070d65aae3202fd0b48d19fd40ec6763b627bcbee6
SHA512 7aedf3cf686b416f8b419f8af1d57675096ab2c2378c5a006f6ecbf2fe1ad701f28b7be8f08c9083230cf4d15d463371e92a6032178cd6c139d60b26fbd49b06

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 d042aa497ce2a9f03296f8de68ed0680
SHA1 f483a343a18b960630ccf0e6de2f82883550f3bf
SHA256 de3d2c5519f74a982f06f3f3fda085571c0cdcf5ad8d2d331c79d9c92062bdc3
SHA512 4e157c8701860982ce0dec956fe4bfb684d2db3eaa9e784f179d385be905fd0551ba90cc27c54179fc39a693d9c742364f2bf1a5444424ba5eae38103b5f0e02

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-interlocked-l1-1-0.dll

MD5 5872cb5ca3980697283aab9007196ae6
SHA1 26e8de47d9bee371f6c7a47f206a131965b6b481
SHA256 0dff50774693fcb71782b5e214419032a8c00b3031151d93be5c971b6f62cd45
SHA512 9b3e2fa9f66d29bfc7a4ca5d673b395bcda223a85fd06c94a11217047c1a312148c9c6270d7f69dfef06b25f8b5ad46717a829bde55f540c804a4ba4c4af070c

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-heap-l1-1-0.dll

MD5 a8b967b65232ecce7261eaecf39e7d6d
SHA1 df0792b29c19d46a93291c88a497151a0ba4366d
SHA256 8fcc9a97a8ad3be9a8d0ce6bb502284dd145ebbe587b42cdeaa4262279517c1d
SHA512 b8116208eb646ec1c103f78c768c848eb9d8d7202ebdab4acb58686e6f0706f0d6aaa884e11065d7ece63ebbd452f35b1422bd79e6eb2405fb1892758195ccbb

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-handle-l1-1-0.dll

MD5 567ff20a8d330cbb3278d3360c8d56f5
SHA1 cdf0cfc650da3a1b57dc3ef982a317d37ffb974d
SHA256 47dfbe1ecc8abc002bd52dcd5281ed7378d457789be4cb1e9bee369150d7f5c8
SHA512 1643e900f13509f0ef9c7b7f8f2401fb3b6f2c0c39b512c623615df92b1e69df042ef1a0c6aace82173ce5d4d3c672c1636d6ee05545ce5c3b7374ab745e0e87

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-file-l2-1-0.dll

MD5 bfffa7117fd9b1622c66d949bac3f1d7
SHA1 402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA256 1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512 b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-file-l1-2-0.dll

MD5 2b36752a5157359da1c0e646ee9bec45
SHA1 708aeb7e945c9c709109cea359cb31bd7ac64889
SHA256 3e3eb284937b572d1d70ce27be77b5e02eb73704c8b50feb5eb933db1facd2fc
SHA512 fc56080362506e3f38f1b3eb9d3193cdb9e576613c2e672f0fe9df203862f8a0f31938fa48b4ff7115dfe6016fa1fd5c5422fdc1913df63b3fde5f478a8417a1

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-file-l1-1-0.dll

MD5 abf9850eb219be4976a94144a9eba057
SHA1 3d8c37588b36296240934b2f63a1b135a52fcee2
SHA256 41c5c577fea3ce13d5beb64ce0920f1061f65bcf39eafa8cd3dfc09ff48bcf76
SHA512 dfaafb43ce7f05b2db35eac10b314fb506c6aada80f6c4327b09ec33c170478ebd0eea19f1c6ca2e4832bfa41f769046deca8f15d54b7966134d166ee6036bda

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 98340ffd2b1d8affef27d4b1260aeac5
SHA1 b428b39aa814a7038a1ddff9b64b935f51833a26
SHA256 7388a019922e9a0a3d05a8605a5307e3141b39f7d57b7faca5d34e72adfd5fa5
SHA512 6165c5be0360d55403e9dfd4e9df4ff9a12e5fb6057ed9278da09e688751487e46d9dd64949375c00764cbb4355cc13a1ea714055050f2ab7d432977b8443f81

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-debug-l1-1-0.dll

MD5 a00ebd3cf88d668be6d62a25fa4fb525
SHA1 edb07eafd08991611389293e2be80f8ee98f1e62
SHA256 b44646453584305d4edf8ab5f5d1adea6b9650bd2b75f8486fc275be52b86433
SHA512 d63f0e9f2e079ee06aa3ab96a0bd2d169564896027b731ee2597327bdc55456c5fd0c2d8c7e68165fc80bbc3fe0c24a3388d4c3615f33fc9f9fc0b205ae9ba7a

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-datetime-l1-1-0.dll

MD5 3095c9577395249e105410bdcc585f77
SHA1 7dfc0c81f8f28cbf36c5acdb83523569b430b944
SHA256 c08be448195f46c4b423d0ce0c2cdc343e842ff1f91b16a8d3c09d5152150917
SHA512 555568fc23ade238bcc13a447520d395546def4409a002d795dd3abea03b15321491bc63c97f4ed8eb78aa411a0b1267dce5c528e51dcac8ca9e93b8f5265786

C:\Users\Admin\AppData\Local\Temp\_MEI25042\api-ms-win-core-console-l1-1-0.dll

MD5 a148dc22ea14cd5578de22b2dfb0917f
SHA1 eaccb66f62e5b6d7154798e596eabd3cef00b982
SHA256 7603e172853a9711fbdc53b080432ad12984b463768dbc3aa842a26f5b26ae23
SHA512 4e3c927692fc41889b596273aea8bbd776cf7644dae26c411c12bda23cd3299a5c9adc06a930294310f002de74592a244767378fc9e37ec76e86bfa23f4c0478

C:\Users\Admin\AppData\Local\Temp\_MEI25042\_lzma.pyd

MD5 542eab18252d569c8abef7c58d303547
SHA1 05eff580466553f4687ae43acba8db3757c08151
SHA256 d2a7111feeaacac8b3a71727482565c46141cc7a5a3d837d8349166bea5054c9
SHA512 b7897b82f1aa9d5aa895c3de810dab1aa335fdf7223e4ff29b32340ad350d9be6b145f95a71c7bc7c88c8df77c3f04853ae4d6f0d5a289721fc1468ecba3f958

C:\Users\Admin\AppData\Local\Temp\_MEI25042\_bz2.pyd

MD5 c413931b63def8c71374d7826fbf3ab4
SHA1 8b93087be080734db3399dc415cc5c875de857e2
SHA256 17bfa656cabf7ef75741003497a1c315b10237805ff171d44625a04c16532293
SHA512 7dc45e7e5ed35cc182de11a1b08c066918920a6879ff8e37b6bfbdd7d40bffa39ea4aca778aa8afb99c81a365c51187db046bceb938ce9ace0596f1cf746474f

C:\Users\Admin\AppData\Local\Temp\_MEI25042\_bz2.pyd

MD5 c413931b63def8c71374d7826fbf3ab4
SHA1 8b93087be080734db3399dc415cc5c875de857e2
SHA256 17bfa656cabf7ef75741003497a1c315b10237805ff171d44625a04c16532293
SHA512 7dc45e7e5ed35cc182de11a1b08c066918920a6879ff8e37b6bfbdd7d40bffa39ea4aca778aa8afb99c81a365c51187db046bceb938ce9ace0596f1cf746474f

memory/3688-1303-0x00007FFA269F0000-0x00007FFA26A13000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI25042\libffi-8.dll

MD5 08b000c3d990bc018fcb91a1e175e06e
SHA1 bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256 135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA512 8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

C:\Users\Admin\AppData\Local\Temp\_MEI25042\_ctypes.pyd

MD5 00f75daaa7f8a897f2a330e00fad78ac
SHA1 44aec43e5f8f1282989b14c4e3bd238c45d6e334
SHA256 9ffadcb2c40ae6b67ab611acc09e050bbe544672cf05e8402a7aa3936326de1f
SHA512 f222f0ebf16a5c6d16aa2fba933034e692e26e81fea4d8b008259aff4102fe8acf3807f3b016c24002daa15bb8778d7fef20f4ae1206d5a6e226f7336d4da5d4

C:\Users\Admin\AppData\Local\Temp\_MEI25042\_ctypes.pyd

MD5 00f75daaa7f8a897f2a330e00fad78ac
SHA1 44aec43e5f8f1282989b14c4e3bd238c45d6e334
SHA256 9ffadcb2c40ae6b67ab611acc09e050bbe544672cf05e8402a7aa3936326de1f
SHA512 f222f0ebf16a5c6d16aa2fba933034e692e26e81fea4d8b008259aff4102fe8acf3807f3b016c24002daa15bb8778d7fef20f4ae1206d5a6e226f7336d4da5d4

C:\Users\Admin\AppData\Local\Temp\_MEI25042\python3.dll

MD5 0e105f62fdd1ff4157560fe38512220b
SHA1 99bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256 803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA512 59c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de

C:\Users\Admin\AppData\Local\Temp\_MEI25042\base_library.zip

MD5 32ede00817b1d74ce945dcd1e8505ad0
SHA1 51b5390db339feeed89bffca925896aff49c63fb
SHA256 4a73d461851b484d213684f0aadf59d537cba6fe7e75497e609d54c9f2ba5d4a
SHA512 a0e070b2ee1347e85f37e9fd589bc8484f206fa9c8f4020de147b815d2041293551e3a14a09a6eb4050cfa1f74843525377e1a99bbdcfb867b61ebddb89f21f7

memory/3688-1359-0x00007FFA1E9E0000-0x00007FFA1E9F9000-memory.dmp

memory/3688-1360-0x00007FFA345B0000-0x00007FFA345BD000-memory.dmp

memory/3688-1361-0x00007FFA1E8D0000-0x00007FFA1E99D000-memory.dmp

memory/3688-1363-0x00007FFA2FC40000-0x00007FFA2FC4D000-memory.dmp

memory/3688-1362-0x00007FFA1E9A0000-0x00007FFA1E9D3000-memory.dmp

memory/3688-1364-0x00007FFA1E8A0000-0x00007FFA1E8C3000-memory.dmp

memory/3688-1365-0x00007FFA2F9C0000-0x00007FFA2F9CB000-memory.dmp

memory/3688-1366-0x00007FFA1E780000-0x00007FFA1E89C000-memory.dmp

memory/3688-1367-0x00007FFA1E740000-0x00007FFA1E778000-memory.dmp

memory/3688-1368-0x00007FFA2F890000-0x00007FFA2F89B000-memory.dmp

memory/3688-1369-0x00007FFA2F740000-0x00007FFA2F74B000-memory.dmp

memory/3688-1370-0x00007FFA2F6D0000-0x00007FFA2F6DC000-memory.dmp

memory/3688-1371-0x00007FFA1EF70000-0x00007FFA1F559000-memory.dmp

memory/3688-1374-0x00007FFA20080000-0x00007FFA2008E000-memory.dmp

memory/3688-1373-0x00007FFA20670000-0x00007FFA2067D000-memory.dmp

memory/3688-1372-0x00007FFA26380000-0x00007FFA2638C000-memory.dmp

memory/3688-1375-0x00007FFA1E720000-0x00007FFA1E72C000-memory.dmp

memory/3688-1377-0x00007FFA1E700000-0x00007FFA1E70B000-memory.dmp

memory/3688-1376-0x00007FFA1E710000-0x00007FFA1E71B000-memory.dmp

memory/3688-1378-0x00007FFA1E6F0000-0x00007FFA1E6FC000-memory.dmp

memory/3688-1379-0x00007FFA1E6E0000-0x00007FFA1E6EC000-memory.dmp

memory/3688-1380-0x00007FFA1E6D0000-0x00007FFA1E6DD000-memory.dmp

memory/3688-1381-0x00007FFA1E6B0000-0x00007FFA1E6C2000-memory.dmp

memory/3688-1382-0x00007FFA1E6A0000-0x00007FFA1E6AC000-memory.dmp

memory/3688-1383-0x00007FFA1E680000-0x00007FFA1E695000-memory.dmp

memory/3688-1385-0x00007FFA2EEE0000-0x00007FFA2EEEB000-memory.dmp

memory/3688-1384-0x00007FFA1E640000-0x00007FFA1E654000-memory.dmp

memory/3688-1386-0x00007FFA2EC50000-0x00007FFA2EC5C000-memory.dmp

memory/3688-1389-0x00007FFA1E660000-0x00007FFA1E672000-memory.dmp

memory/3688-1388-0x00007FFA1E730000-0x00007FFA1E73C000-memory.dmp

memory/3688-1387-0x00007FFA29120000-0x00007FFA2912B000-memory.dmp

memory/3688-1390-0x00007FFA1E620000-0x00007FFA1E63B000-memory.dmp

memory/3688-1391-0x00007FFA1E5E0000-0x00007FFA1E5F5000-memory.dmp

memory/3688-1392-0x00007FFA1E5A0000-0x00007FFA1E5E0000-memory.dmp

memory/3688-1393-0x00007FFA1E590000-0x00007FFA1E59E000-memory.dmp

memory/3688-1394-0x00007FFA1E500000-0x00007FFA1E55D000-memory.dmp

memory/3688-1395-0x00007FFA1E4A0000-0x00007FFA1E4CE000-memory.dmp

memory/3688-1396-0x00007FFA1E460000-0x00007FFA1E483000-memory.dmp

memory/3688-1397-0x00007FFA1EA00000-0x00007FFA1EF20000-memory.dmp

memory/3688-1398-0x00007FFA1E600000-0x00007FFA1E612000-memory.dmp

memory/3688-1399-0x00007FFA1E560000-0x00007FFA1E57C000-memory.dmp

memory/3688-1400-0x00007FFA1E4D0000-0x00007FFA1E4F9000-memory.dmp

memory/3688-1401-0x00007FFA1E2E0000-0x00007FFA1E457000-memory.dmp

memory/3688-1402-0x00007FFA1E2C0000-0x00007FFA1E2DC000-memory.dmp

memory/3688-1405-0x00007FFA1E270000-0x00007FFA1E27C000-memory.dmp

memory/3688-1407-0x00007FFA1E250000-0x00007FFA1E25C000-memory.dmp

memory/3688-1406-0x00007FFA1E260000-0x00007FFA1E26B000-memory.dmp

memory/3688-1408-0x00007FFA1E230000-0x00007FFA1E23E000-memory.dmp

memory/3688-1404-0x00007FFA1E280000-0x00007FFA1E28B000-memory.dmp

memory/3688-1410-0x00007FFA1E210000-0x00007FFA1E21C000-memory.dmp

memory/3688-1409-0x00007FFA1E220000-0x00007FFA1E22C000-memory.dmp

memory/3688-1403-0x00007FFA1E2A0000-0x00007FFA1E2AB000-memory.dmp

memory/3688-1411-0x00007FFA1E200000-0x00007FFA1E20B000-memory.dmp

memory/3688-1413-0x00007FFA1E1C0000-0x00007FFA1E1CD000-memory.dmp

memory/3688-1414-0x00007FFA1E1A0000-0x00007FFA1E1B2000-memory.dmp

memory/3688-1412-0x00007FFA1E1F0000-0x00007FFA1E1FB000-memory.dmp

memory/3688-1415-0x00007FFA1E190000-0x00007FFA1E19C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sjn2ef3a.dn1.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3688-1543-0x00007FFA1EF70000-0x00007FFA1F559000-memory.dmp

memory/3688-1544-0x00007FFA269F0000-0x00007FFA26A13000-memory.dmp

memory/3688-1545-0x00007FFA345C0000-0x00007FFA345CF000-memory.dmp

memory/3688-1548-0x00007FFA1EF20000-0x00007FFA1EF34000-memory.dmp

memory/3688-1546-0x00007FFA282B0000-0x00007FFA282C9000-memory.dmp

memory/3688-1547-0x00007FFA1EF40000-0x00007FFA1EF6D000-memory.dmp

memory/3688-1549-0x00007FFA1EA00000-0x00007FFA1EF20000-memory.dmp

memory/3688-1550-0x00007FFA1E9E0000-0x00007FFA1E9F9000-memory.dmp

memory/3688-1551-0x00007FFA345B0000-0x00007FFA345BD000-memory.dmp

memory/3688-1552-0x00007FFA1E9A0000-0x00007FFA1E9D3000-memory.dmp

memory/3688-1553-0x00007FFA1E8D0000-0x00007FFA1E99D000-memory.dmp

memory/3688-1554-0x00007FFA2FC40000-0x00007FFA2FC4D000-memory.dmp

memory/3688-1555-0x00007FFA2F9C0000-0x00007FFA2F9CB000-memory.dmp

memory/3688-1556-0x00007FFA1E8A0000-0x00007FFA1E8C3000-memory.dmp

memory/3688-1557-0x00007FFA1E780000-0x00007FFA1E89C000-memory.dmp

memory/3688-1558-0x00007FFA1E740000-0x00007FFA1E778000-memory.dmp

memory/3688-1560-0x00007FFA1E660000-0x00007FFA1E672000-memory.dmp

memory/3688-1559-0x00007FFA1E680000-0x00007FFA1E695000-memory.dmp

memory/3688-1561-0x00007FFA1E640000-0x00007FFA1E654000-memory.dmp

memory/3688-1562-0x00007FFA1E620000-0x00007FFA1E63B000-memory.dmp

memory/3688-1563-0x00007FFA1E600000-0x00007FFA1E612000-memory.dmp

memory/3688-1564-0x00007FFA1E5E0000-0x00007FFA1E5F5000-memory.dmp

memory/3688-1565-0x00007FFA1E5A0000-0x00007FFA1E5E0000-memory.dmp

memory/3688-1566-0x00007FFA1E590000-0x00007FFA1E59E000-memory.dmp

memory/3688-1567-0x00007FFA1E560000-0x00007FFA1E57C000-memory.dmp

memory/3688-1569-0x00007FFA1E500000-0x00007FFA1E55D000-memory.dmp

memory/3688-1570-0x00007FFA1E4D0000-0x00007FFA1E4F9000-memory.dmp

memory/3688-1576-0x00007FFA1E460000-0x00007FFA1E483000-memory.dmp

memory/3688-1575-0x00007FFA1E4A0000-0x00007FFA1E4CE000-memory.dmp

memory/3688-1612-0x00007FFA1E2E0000-0x00007FFA1E457000-memory.dmp

memory/3688-1629-0x00007FFA1E150000-0x00007FFA1E186000-memory.dmp

memory/3688-1626-0x00007FFA1E2C0000-0x00007FFA1E2DC000-memory.dmp

memory/3688-1660-0x00007FFA1E090000-0x00007FFA1E14C000-memory.dmp

memory/3688-1663-0x00007FFA1E010000-0x00007FFA1E03B000-memory.dmp

memory/3688-1665-0x00007FFA1DDB0000-0x00007FFA1E004000-memory.dmp

memory/3688-1670-0x00007FFA1DD50000-0x00007FFA1DDA5000-memory.dmp

memory/3688-1698-0x00007FFA1DA40000-0x00007FFA1DD1F000-memory.dmp

memory/3688-1728-0x00007FFA1B8F0000-0x00007FFA1B911000-memory.dmp

memory/3688-1729-0x00007FFA1B8C0000-0x00007FFA1B8E2000-memory.dmp

memory/3688-1727-0x00007FFA1B920000-0x00007FFA1B937000-memory.dmp

memory/3688-1724-0x00007FFA1B940000-0x00007FFA1DA33000-memory.dmp

memory/3688-1730-0x00007FFA1B820000-0x00007FFA1B8BC000-memory.dmp

memory/3688-1735-0x00007FFA1B760000-0x00007FFA1B7A7000-memory.dmp

memory/3688-1734-0x00007FFA1B7B0000-0x00007FFA1B7E3000-memory.dmp

memory/3688-1737-0x00007FFA1B740000-0x00007FFA1B75A000-memory.dmp

memory/3688-1732-0x00007FFA1B7F0000-0x00007FFA1B820000-memory.dmp

memory/3688-1740-0x00007FFA1B720000-0x00007FFA1B739000-memory.dmp

memory/3688-1742-0x00007FFA1B700000-0x00007FFA1B71D000-memory.dmp

memory/3688-1744-0x00007FFA1B6E0000-0x00007FFA1B6F3000-memory.dmp

memory/3688-1746-0x00007FFA1B620000-0x00007FFA1B6D4000-memory.dmp

memory/3688-1747-0x00007FFA1B600000-0x00007FFA1B61A000-memory.dmp

memory/3688-1750-0x00007FFA1B1F0000-0x00007FFA1B5FF000-memory.dmp

memory/3688-1752-0x00007FFA1B150000-0x00007FFA1B1E3000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-04 11:06

Reported

2023-10-04 11:08

Platform

win7-20230831-en

Max time kernel

29s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\windowshosts.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\windowshosts.exe

"C:\Users\Admin\AppData\Local\Temp\windowshosts.exe"

C:\Users\Admin\AppData\Local\Temp\windowshosts.exe

"C:\Users\Admin\AppData\Local\Temp\windowshosts.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI28282\ucrtbase.dll

MD5 0e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA1 4189f4459c54e69c6d3155a82524bda7549a75a6
SHA256 8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512 a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

\Users\Admin\AppData\Local\Temp\_MEI28282\ucrtbase.dll

MD5 0e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA1 4189f4459c54e69c6d3155a82524bda7549a75a6
SHA256 8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512 a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

C:\Users\Admin\AppData\Local\Temp\_MEI28282\api-ms-win-core-localization-l1-2-0.dll

MD5 3589557535bba7641da3d76eefb0c73d
SHA1 6f63107c2212300c7cd1573059c08b43e5bd9b95
SHA256 642b01bb93d2cb529acf56070d65aae3202fd0b48d19fd40ec6763b627bcbee6
SHA512 7aedf3cf686b416f8b419f8af1d57675096ab2c2378c5a006f6ecbf2fe1ad701f28b7be8f08c9083230cf4d15d463371e92a6032178cd6c139d60b26fbd49b06

\Users\Admin\AppData\Local\Temp\_MEI28282\api-ms-win-core-localization-l1-2-0.dll

MD5 3589557535bba7641da3d76eefb0c73d
SHA1 6f63107c2212300c7cd1573059c08b43e5bd9b95
SHA256 642b01bb93d2cb529acf56070d65aae3202fd0b48d19fd40ec6763b627bcbee6
SHA512 7aedf3cf686b416f8b419f8af1d57675096ab2c2378c5a006f6ecbf2fe1ad701f28b7be8f08c9083230cf4d15d463371e92a6032178cd6c139d60b26fbd49b06

C:\Users\Admin\AppData\Local\Temp\_MEI28282\api-ms-win-core-processthreads-l1-1-1.dll

MD5 774aa9f9318880cb4ad3bf6f464da556
SHA1 3a5c07cf35009c98eb033e1cbde1900135d1abf8
SHA256 ba9fbd3a21879614c050c86a74ad2fffc0362266d6fa7be0ef359de393136346
SHA512 f7b57afb9810e3390d27a5469572fb29f0f1726f599403a180e685466237dff5dec4fdce40105ef1bb057e012d546308213e7cec73e0d7d3c5815eec8189a75d

\Users\Admin\AppData\Local\Temp\_MEI28282\api-ms-win-core-processthreads-l1-1-1.dll

MD5 774aa9f9318880cb4ad3bf6f464da556
SHA1 3a5c07cf35009c98eb033e1cbde1900135d1abf8
SHA256 ba9fbd3a21879614c050c86a74ad2fffc0362266d6fa7be0ef359de393136346
SHA512 f7b57afb9810e3390d27a5469572fb29f0f1726f599403a180e685466237dff5dec4fdce40105ef1bb057e012d546308213e7cec73e0d7d3c5815eec8189a75d

C:\Users\Admin\AppData\Local\Temp\_MEI28282\api-ms-win-core-file-l1-2-0.dll

MD5 2b36752a5157359da1c0e646ee9bec45
SHA1 708aeb7e945c9c709109cea359cb31bd7ac64889
SHA256 3e3eb284937b572d1d70ce27be77b5e02eb73704c8b50feb5eb933db1facd2fc
SHA512 fc56080362506e3f38f1b3eb9d3193cdb9e576613c2e672f0fe9df203862f8a0f31938fa48b4ff7115dfe6016fa1fd5c5422fdc1913df63b3fde5f478a8417a1

\Users\Admin\AppData\Local\Temp\_MEI28282\api-ms-win-core-file-l1-2-0.dll

MD5 2b36752a5157359da1c0e646ee9bec45
SHA1 708aeb7e945c9c709109cea359cb31bd7ac64889
SHA256 3e3eb284937b572d1d70ce27be77b5e02eb73704c8b50feb5eb933db1facd2fc
SHA512 fc56080362506e3f38f1b3eb9d3193cdb9e576613c2e672f0fe9df203862f8a0f31938fa48b4ff7115dfe6016fa1fd5c5422fdc1913df63b3fde5f478a8417a1

C:\Users\Admin\AppData\Local\Temp\_MEI28282\api-ms-win-core-timezone-l1-1-0.dll

MD5 b9a20c9223d3e3d3a0c359f001ce1046
SHA1 9710b9a8c393ba00c254cf693c7c37990c447cc8
SHA256 00d9a7353be0a54c17e4862b86196a8b2bc6a007899fa2fbe61afd9765548068
SHA512 a7d5611c0b3b53da6cac61e0374d54d27e6e8a1af90ef66cd7e1b052f906c8b3f6087f4c6de0db3ae0b099df7689ecde6c815a954b728d36d9d3b5d002ccf18e

C:\Users\Admin\AppData\Local\Temp\_MEI28282\python311.dll

MD5 5f6fd64ec2d7d73ae49c34dd12cedb23
SHA1 c6e0385a868f3153a6e8879527749db52dce4125
SHA256 ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967
SHA512 c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab

\Users\Admin\AppData\Local\Temp\_MEI28282\api-ms-win-core-file-l2-1-0.dll

MD5 bfffa7117fd9b1622c66d949bac3f1d7
SHA1 402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA256 1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512 b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

C:\Users\Admin\AppData\Local\Temp\_MEI28282\api-ms-win-core-file-l2-1-0.dll

MD5 bfffa7117fd9b1622c66d949bac3f1d7
SHA1 402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA256 1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512 b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

\Users\Admin\AppData\Local\Temp\_MEI28282\api-ms-win-core-timezone-l1-1-0.dll

MD5 b9a20c9223d3e3d3a0c359f001ce1046
SHA1 9710b9a8c393ba00c254cf693c7c37990c447cc8
SHA256 00d9a7353be0a54c17e4862b86196a8b2bc6a007899fa2fbe61afd9765548068
SHA512 a7d5611c0b3b53da6cac61e0374d54d27e6e8a1af90ef66cd7e1b052f906c8b3f6087f4c6de0db3ae0b099df7689ecde6c815a954b728d36d9d3b5d002ccf18e

\Users\Admin\AppData\Local\Temp\_MEI28282\python311.dll

MD5 5f6fd64ec2d7d73ae49c34dd12cedb23
SHA1 c6e0385a868f3153a6e8879527749db52dce4125
SHA256 ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967
SHA512 c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab

memory/2568-1302-0x000007FEF5FD0000-0x000007FEF65B9000-memory.dmp