Malware Analysis Report

2025-01-22 14:02

Sample ID 240225-y1tnlsbb85
Target ApplicationSetup 14.exe
SHA256 b01a6d6530594581e3e4f0907b71f036a2ce0252d0995effcfab25013a9917aa
Tags
njrat hacked evasion pyinstaller trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b01a6d6530594581e3e4f0907b71f036a2ce0252d0995effcfab25013a9917aa

Threat Level: Known bad

The file ApplicationSetup 14.exe was found to be: Known bad.

Malicious Activity Summary

njrat hacked evasion pyinstaller trojan

njRAT/Bladabindi

Disables Task Manager via registry modification

Modifies Windows Firewall

Executes dropped EXE

Checks computer location settings

Drops startup file

Loads dropped DLL

Looks up external IP address via web service

Drops autorun.inf file

Drops file in System32 directory

Drops file in Program Files directory

Unsigned PE

Detects Pyinstaller

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-25 20:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-25 20:15

Reported

2024-02-25 20:18

Platform

win7-20240221-en

Max time kernel

150s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe"

Signatures

njRAT/Bladabindi

trojan njrat

Disables Task Manager via registry modification

evasion

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Drops startup file

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\742480850a3c457758da290ee11e533cWindows Update.exe C:\Users\Admin\AppData\Roaming\server.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe C:\Users\Admin\AppData\Roaming\server.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe C:\Users\Admin\AppData\Roaming\server.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe C:\Users\Admin\AppData\Roaming\server.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe C:\Users\Admin\AppData\Roaming\server.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\742480850a3c457758da290ee11e533cWindows Update.exe C:\Users\Admin\AppData\Roaming\server.exe N/A

Drops autorun.inf file

Description Indicator Process Target
File opened for modification C:\autorun.inf C:\Users\Admin\AppData\Roaming\server.exe N/A
File created F:\autorun.inf C:\Users\Admin\AppData\Roaming\server.exe N/A
File opened for modification F:\autorun.inf C:\Users\Admin\AppData\Roaming\server.exe N/A
File created C:\autorun.inf C:\Users\Admin\AppData\Roaming\server.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\Explower.exe C:\Users\Admin\AppData\Roaming\server.exe N/A
File opened for modification C:\Windows\SysWOW64\Explower.exe C:\Users\Admin\AppData\Roaming\server.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Explower.exe C:\Users\Admin\AppData\Roaming\server.exe N/A
File opened for modification C:\Program Files (x86)\Explower.exe C:\Users\Admin\AppData\Roaming\server.exe N/A

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\server.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\server.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\server.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2700 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\Lol.exe
PID 2700 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\Lol.exe
PID 2700 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\Lol.exe
PID 2700 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\Lol.exe
PID 2700 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\Lol.exe
PID 2700 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\Lol.exe
PID 2700 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\Lol.exe
PID 2700 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\creal.exe
PID 2700 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\creal.exe
PID 2700 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\creal.exe
PID 2700 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe C:\Users\Admin\AppData\Local\Temp\creal.exe
PID 2664 wrote to memory of 836 N/A C:\Users\Admin\AppData\Local\Temp\creal.exe C:\Users\Admin\AppData\Local\Temp\creal.exe
PID 2664 wrote to memory of 836 N/A C:\Users\Admin\AppData\Local\Temp\creal.exe C:\Users\Admin\AppData\Local\Temp\creal.exe
PID 2664 wrote to memory of 836 N/A C:\Users\Admin\AppData\Local\Temp\creal.exe C:\Users\Admin\AppData\Local\Temp\creal.exe
PID 2504 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\Lol.exe C:\Users\Admin\AppData\Roaming\server.exe
PID 2504 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\Lol.exe C:\Users\Admin\AppData\Roaming\server.exe
PID 2504 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\Lol.exe C:\Users\Admin\AppData\Roaming\server.exe
PID 2504 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\Lol.exe C:\Users\Admin\AppData\Roaming\server.exe
PID 2504 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\Lol.exe C:\Users\Admin\AppData\Roaming\server.exe
PID 2504 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\Lol.exe C:\Users\Admin\AppData\Roaming\server.exe
PID 2504 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\Lol.exe C:\Users\Admin\AppData\Roaming\server.exe
PID 2760 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe
PID 2760 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Roaming\server.exe C:\Windows\SysWOW64\netsh.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe

"C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe"

C:\Users\Admin\AppData\Local\Temp\Lol.exe

"C:\Users\Admin\AppData\Local\Temp\Lol.exe"

C:\Users\Admin\AppData\Local\Temp\creal.exe

"C:\Users\Admin\AppData\Local\Temp\creal.exe"

C:\Users\Admin\AppData\Local\Temp\creal.exe

"C:\Users\Admin\AppData\Local\Temp\creal.exe"

C:\Users\Admin\AppData\Roaming\server.exe

"C:\Users\Admin\AppData\Roaming\server.exe"

C:\Windows\SysWOW64\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE

C:\Windows\SysWOW64\netsh.exe

netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe"

C:\Windows\SysWOW64\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE

Network

Country Destination Domain Proto
US 8.8.8.8:53 kisel228.zapto.org udp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
US 8.8.8.8:53 kisel228.zapto.org udp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
US 8.8.8.8:53 kisel228.zapto.org udp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp
RU 95.86.227.200:25565 kisel228.zapto.org tcp

Files

\Users\Admin\AppData\Local\Temp\Lol.exe

MD5 9e4d9908815be3e2244c857863ec309a
SHA1 e0dc0c88151069986c7104d12fa3223ad1fe07bb
SHA256 a976cc4bb39183a99f5341cda18b789d1c345eaf37221c71291b823eb457c6be
SHA512 795bebd046b5c147fed8726a7f772d2e5900be31e1f1a81d4052619d4325e1f51445193319ad93e37d17c70d4ac0ff01d2ebbe6ac2d85c4feb91dbfe992d8b9b

\Users\Admin\AppData\Local\Temp\creal.exe

MD5 6d14b9491e3881897e21681d7a0a62b8
SHA1 5fde4f378f63db74d3a184c8fdcb58e8e62f2caa
SHA256 2d9f4a041f9218d30763053530f52d2ca6eee4f3f9ffa249155bd744f07282de
SHA512 cf570a4a92f605f6e0699a3379d6675dc387770665c895a28662e766a7d39d67b8d46fab304c0c6128599dad32b8401f09819b25b22c799d75feff282dd0a51d

C:\Users\Admin\AppData\Local\Temp\creal.exe

MD5 f181dad51052f633d5672bb256f4cd4c
SHA1 0e1d1fbde72460a818ba1f16f813382e97fbc61a
SHA256 f518a8705eb051fd8e98d0c14b599587d04a7ac9c1aed3868d0bdd75b5591f86
SHA512 a802853a553742dd8655a1d00c4550ad86ef04a6f68a973740cd514009650d4fc0e54efd04ea9967b2228f4b4fe94ba9ee40a7aa99a6c2b711960c113744d0be

C:\Users\Admin\AppData\Local\Temp\creal.exe

MD5 e713b4ecadae22ff5a07bb7238a24f86
SHA1 a533d8d0eb1897b9e75096685e2bdb864f99c6a3
SHA256 16302b9903f6f97604ab5e03490d85547817ba94fe58536466cc09b4b53262b1
SHA512 3261b2a2af3153f9dc05065c457859f48833baa72fd879819fed002b4b9097bdb3c8a50ef958d04dac756f057f20ef9c2cd1437089e9f9be3b02b92b0a819a52

C:\Users\Admin\AppData\Local\Temp\_MEI26642\python312.dll

MD5 82c9700ca6b352383ff1b8c3b806cd5b
SHA1 22f3ef05a1f5ff8eb54394647a560aeb983545c5
SHA256 5405e8f79d0f62cb60e3deea5465ddb76afc8ad730b4482f1efaa87f5e1e8380
SHA512 c4c713e2cd89ae43c14320f1e4f59e2179b1dcbd969d11700456507921421e7c3b873546688078c5ac7df6ee9713347d8829cb3885c57ddd442dfc422c8de37a

C:\Users\Admin\AppData\Local\Temp\creal.exe

MD5 c05b8261f12744400e1f5d4346836d9a
SHA1 efcae12a817cd532afc2287905fa416e785500f3
SHA256 2b939ff023c28713104523aa5b14ce1f695045a56a998c71524a9189bc8a0372
SHA512 be95235c58f315e3ef62e27a847212ddf02ca75fd78dd1f05e4a0a9f97bde08fc7530075eb9009eafd9a027feb7f0dd2af9704d16dac0eec8b1dc681f7a8ff51

\Users\Admin\AppData\Local\Temp\creal.exe

MD5 99b60bbd0085286bb2cedf7ba86657d3
SHA1 6b2f024cbc0956fcd8dbe933aaeb379a48971011
SHA256 a6d08e096ae0d2c0741043fed5aa5760f094764f630d61f026177439c21a2536
SHA512 08827ec621e1db940de3a83ca81cf05ab3fa26878fc29a624a5783c22d633ffc51748c80ca4f9512d4f2d42c643d17fac492b794f638a212924701f6c7598934

memory/2504-95-0x0000000073D10000-0x00000000742BB000-memory.dmp

\Users\Admin\AppData\Local\Temp\_MEI26642\python312.dll

MD5 b849e8201f088c4aef9ca325c5c7f2cd
SHA1 30c1e0944524b28410bb9f4ebde61e5bcc994c4f
SHA256 ca76e97fd82201a8ef84eaceeb064684c48fdd7f0e3bba00ff064747e603065e
SHA512 660c41680e350dc75c18500c77679de30148bb79c3464172f080c23df5371e9ca20b4560dc5f2fd4ec7d220b37652a5ebe2c557e409908fe317b03dabab81337

memory/2760-112-0x0000000073D10000-0x00000000742BB000-memory.dmp

memory/2504-111-0x0000000073D10000-0x00000000742BB000-memory.dmp

C:\Users\Admin\AppData\Roaming\app

MD5 cac4598fdc0f92181616d12833eb6ca1
SHA1 80a7b7a46a0e8e674b782b9eb569e5430a69c84b
SHA256 275918973c23ad700f278c69cc03c9c82ec9f4d9ed0f53111ad22bec197ff440
SHA512 01a7556bfcce6d9d8251aadc7f6e6169fdd0477d487ce88729c44bfe8b85b2eee500985d553c0479765ef5b5c6dc3517c0305efb9089814c3f8a9ea6fc51c713

memory/2760-146-0x0000000073D10000-0x00000000742BB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-25 20:15

Reported

2024-02-25 20:16

Platform

win10v2004-20240221-en

Max time kernel

11s

Max time network

20s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe"

Signatures

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Lol.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe

"C:\Users\Admin\AppData\Local\Temp\ApplicationSetup 14.exe"

C:\Users\Admin\AppData\Local\Temp\Lol.exe

"C:\Users\Admin\AppData\Local\Temp\Lol.exe"

C:\Users\Admin\AppData\Local\Temp\creal.exe

"C:\Users\Admin\AppData\Local\Temp\creal.exe"

C:\Users\Admin\AppData\Local\Temp\creal.exe

"C:\Users\Admin\AppData\Local\Temp\creal.exe"

C:\Users\Admin\AppData\Roaming\server.exe

"C:\Users\Admin\AppData\Roaming\server.exe"

C:\Windows\SysWOW64\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl http://api.ipify.org/ --ssl-no-revoke"

C:\Windows\system32\curl.exe

curl http://api.ipify.org/ --ssl-no-revoke

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic bios get smbiosbiosversion"

C:\Windows\System32\Wbem\WMIC.exe

wmic bios get smbiosbiosversion

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic MemoryChip get /format:list | find /i "Speed""

C:\Windows\System32\Wbem\WMIC.exe

wmic MemoryChip get /format:list

C:\Windows\system32\find.exe

find /i "Speed"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "powershell wininit.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell wininit.exe

C:\Windows\SysWOW64\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE

C:\Windows\SysWOW64\netsh.exe

netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe"

C:\Windows\system32\wininit.exe

"C:\Windows\system32\wininit.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 api.ipify.org udp
US 104.26.13.205:80 api.ipify.org tcp
US 8.8.8.8:53 205.13.26.104.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\Lol.exe

MD5 9e4d9908815be3e2244c857863ec309a
SHA1 e0dc0c88151069986c7104d12fa3223ad1fe07bb
SHA256 a976cc4bb39183a99f5341cda18b789d1c345eaf37221c71291b823eb457c6be
SHA512 795bebd046b5c147fed8726a7f772d2e5900be31e1f1a81d4052619d4325e1f51445193319ad93e37d17c70d4ac0ff01d2ebbe6ac2d85c4feb91dbfe992d8b9b

C:\Users\Admin\AppData\Local\Temp\creal.exe

MD5 da5794a2a7b924f60c1c7497c01d3eb4
SHA1 4db95ac0e0fc6c41fc891aa0ade6191b630d487e
SHA256 11c2d1bba326bd6a9c5899bc6fc86b887a0a232d2750c5507e301e4024cf6fd0
SHA512 75a9c7c580c1f6ae996384290efa0a57445f48eb055f8c7ef885bc75f4197068d74678a2f3ae0f0c8f3348ac5d2ea273992938aafe40007390bcfed8dd86fa9a

C:\Users\Admin\AppData\Local\Temp\creal.exe

MD5 486f47f6e446fc8f8eecff690f8f5bc5
SHA1 0a92ecc31618dee78facf21dcbe29086c7668382
SHA256 7e36b481059ae564e7b5320b9b82c19d95bd49abea9160bcbdbd5b851c430cab
SHA512 935e204f00228a3b7e916b2cb98e6a7277a2a5b2b0c077f91d0aab66bd3a0a46ba3a0d8bf40c7ced84d2c2b42eccfd8eba92ebdaeb727044e8d2f843de3c0a29

memory/1740-15-0x0000000073940000-0x0000000073EF1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\creal.exe

MD5 0c18550a3078ae73b7aa5f20116d0498
SHA1 990e4bd19d286f3733440b1b99e1ccb2d3db2821
SHA256 b5524ee944ee779d867ae510520b3d5cb9503feb45c7cb8fb210e5eae12b8103
SHA512 6d0771022091c06fe928402148b6aafe99b98863d0db07ac220ea0aa86840cb781f19080b2f216ffa1894780216b6c928398b433403bd7e8492699a9a6b5ac41

memory/1740-52-0x0000000073940000-0x0000000073EF1000-memory.dmp

memory/1740-58-0x0000000001500000-0x0000000001510000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI17802\python312.dll

MD5 573ab0c53816457cf3203829d4ac5e05
SHA1 151ea67c3fdd1bbe20886823e6221a623d3f1072
SHA256 87a120ba900dbdc6d4054ad034552279f081d97e6a8686cad1255a56d5b84583
SHA512 0a5b9c352f7141db9403fd12d0992d0fceb293a7f0d6227cc489d14be2f2f318bd3df170b27edd48260fd07e9a5a6911111a73f21de8022f0f19b3509c441d8f

C:\Users\Admin\AppData\Local\Temp\creal.exe

MD5 e2e6ea8d8b6188bb17f0a23f35b165fb
SHA1 d9bb6317eaa0fca753a96b46a9151ecbb4f64ebb
SHA256 1a143e86cad89871bb29bceece0c5d4eb9490e02a8a214d7efec80dff9fd768b
SHA512 b8e7be1e617553bdd9a4b284c1bb25e1a8083928738d2bc2bd21071151f2bad0b78addb97ba23b86e3f457ac07350abd61d0f5182889fcf3ecfb1db9608d0f80

C:\Users\Admin\AppData\Local\Temp\_MEI17802\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

C:\Users\Admin\AppData\Local\Temp\_MEI17802\python312.dll

MD5 468e5ef8b73e947898937467a6065ece
SHA1 06af66a6592923058ee49925c3877839b2e7c344
SHA256 9a229484164565b9f87f1dd222b937725d5654bfeb241773719eca2d0a279a0f
SHA512 afff8bd9149440ed87173a161fa46c10d324f7b89e2bc36127bf12520908e5989f9cb288e2d3161791774b07d166b1921c2380c607283bcba4a0bc7aff730fb3

C:\Users\Admin\AppData\Local\Temp\_MEI17802\base_library.zip

MD5 065573fa48d697ef8f3c766231cce313
SHA1 4ab01ba0f1110fbe0fb132a8ee59a4af631c0b2f
SHA256 6f0b93fa9887d710003195327b18a56b5d74e178445ca64ba24ba70231c8bc62
SHA512 85cc1abba81b215fe61368fc978d2d1463e825c677a8de239cf37a0eed3112abe4b26adf6596a13fec8761cc273b673a9f5c89cae420e60fd4303c3d45729c5d

C:\Users\Admin\AppData\Local\Temp\_MEI17802\libffi-8.dll

MD5 0f8e4992ca92baaf54cc0b43aaccce21
SHA1 c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256 eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA512 6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_bz2.pyd

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_wmi.pyd

MD5 c1654ebebfeeda425eade8b77ca96de5
SHA1 a4a150f1c810077b6e762f689c657227cc4fd257
SHA256 aa1443a715fbf84a84f39bd89707271fc11a77b597d7324ce86fc5cfa56a63a9
SHA512 21705b991e75efd5e59b8431a3b19ae5fcc38a3e7f137a9d52acd24e7f67d61758e48abc1c9c0d4314fa02010a1886c15ead5bca8dca1b1d4ccbfc3c589d342e

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_ssl.pyd

MD5 ddb21bd1acde4264754c49842de7ebc9
SHA1 80252d0e35568e68ded68242d76f2a5d7e00001e
SHA256 72bb15cd8c14ba008a52d23cdcfc851a9a4bde13deee302a5667c8ad60f94a57
SHA512 464520ecd1587f5cede6219faac2c903ee41d0e920bf3c9c270a544b040169dcd17a4e27f6826f480d4021077ab39a6cbbd35ebb3d71672ebb412023bc9e182a

C:\Users\Admin\AppData\Local\Temp\_MEI17802\select.pyd

MD5 8a273f518973801f3c63d92ad726ec03
SHA1 069fc26b9bd0f6ea3f9b3821ad7c812fd94b021f
SHA256 af358285a7450de6e2e5e7ff074f964d6a257fb41d9eb750146e03c7dda503ca
SHA512 7fedae0573ecb3946ede7d0b809a98acad3d4c95d6c531a40e51a31bdb035badc9f416d8aaa26463784ff2c5e7a0cc2c793d62b5fdb2b8e9fad357f93d3a65f8

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_queue.pyd

MD5 f3eca4f0b2c6c17ace348e06042981a4
SHA1 eb694dda8ff2fe4ccae876dc0515a8efec40e20e
SHA256 fb57ee6adf6e7b11451b6920ddd2fb943dcd9561c9eae64fdda27c7ed0bc1b04
SHA512 604593460666045ca48f63d4b14fa250f9c4b9e5c7e228cc9202e7692c125aacb0018b89faa562a4197692a9bc3d2382f9e085b305272ee0a39264a2a0f53b75

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_socket.pyd

MD5 9c6283cc17f9d86106b706ec4ea77356
SHA1 af4f2f52ce6122f340e5ea1f021f98b1ffd6d5b6
SHA256 5cc62aac52edf87916deb4ebbad9abb58a6a3565b32e7544f672aca305c38027
SHA512 11fd6f570dd78f8ff00be645e47472a96daffa3253e8bd29183bccde3f0746f7e436a106e9a68c57cc05b80a112365441d06cc719d51c906703b428a32c93124

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_sqlite3.pyd

MD5 506b13dd3d5892b16857e3e3b8a95afb
SHA1 42e654b36f1c79000084599d49b862e4e23d75ff
SHA256 04f645a32b0c58760cc6c71d09224fe90e50409ef5c81d69c85d151dfe65aff9
SHA512 a94f0e9f2212e0b89eb0b5c64598b18af71b59e1297f0f6475fa4674ae56780b1e586b5eb952c8c9febad38c28afd784273bbf56645db2c405afae6f472fb65c

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_overlapped.pyd

MD5 61193e813a61a545e2d366439c1ee22a
SHA1 f404447b0d9bff49a7431c41653633c501986d60
SHA256 c21b50a7bf9dbe1a0768f5030cac378d58705a9fe1f08d953129332beb0fbefc
SHA512 747e4d5ea1bdf8c1e808579498834e1c24641d434546bffdfcf326e0de8d5814504623a3d3729168b0098824c2b8929afc339674b0d923388b9dac66f5d9d996

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_multiprocessing.pyd

MD5 4ccbd87d76af221f24221530f5f035d1
SHA1 d02b989aaac7657e8b3a70a6ee7758a0b258851b
SHA256 c7bbcfe2511fd1b71b916a22ad6537d60948ffa7bde207fefabee84ef53cafb5
SHA512 34d808adac96a66ca434d209f2f151a9640b359b8419dc51ba24477e485685af10c4596a398a85269e8f03f0fc533645907d7d854733750a35bf6c691de37799

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_hashlib.pyd

MD5 b0262bd89a59a3699bfa75c4dcc3ee06
SHA1 eb658849c646a26572dea7f6bfc042cb62fb49dc
SHA256 4adfbbd6366d9b55d902fc54d2b42e7c8c989a83016ed707bd7a302fc3fc7b67
SHA512 2e4b214de3b306e3a16124af434ff8f5ab832aa3eeb1aa0aa9b49b0ada0928dcbb05c57909292fbe3b01126f4cd3fe0dac9cc15eaea5f3844d6e267865b9f7b1

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_decimal.pyd

MD5 f930b7550574446a015bc602d59b0948
SHA1 4ee6ff8019c6c540525bdd2790fc76385cdd6186
SHA256 3b9ad1d2bc9ec03d37da86135853dac73b3fe851b164fe52265564a81eb8c544
SHA512 10b864975945d6504433554f9ff11b47218caa00f809c6bce00f9e4089b862190a4219f659697a4ba5e5c21edbe1d8d325950921e09371acc4410469bd9189ee

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_cffi_backend.cp312-win_amd64.pyd

MD5 0572b13646141d0b1a5718e35549577c
SHA1 eeb40363c1f456c1c612d3c7e4923210eae4cdf7
SHA256 d8a76d1e31bbd62a482dea9115fc1a109cb39af4cf6d1323409175f3c93113a7
SHA512 67c28432ca8b389acc26e47eb8c4977fddd4af9214819f89df07fecbc8ed750d5f35807a1b195508dd1d77e2a7a9d7265049dcfbfe7665a7fd1ba45da1e4e842

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_asyncio.pyd

MD5 209cbcb4e1a16aa39466a6119322343c
SHA1 cdcce6b64ebf11fecff739cbc57e7a98d6620801
SHA256 f7069734d5174f54e89b88d717133bff6a41b01e57f79957ab3f02daa583f9e2
SHA512 5bbc4ede01729e628260cf39df5809624eae795fd7d51a1ed770ed54663955674593a97b78f66dbf6ae268186273840806ed06d6f7877444d32fdca031a9f0da

C:\Users\Admin\AppData\Local\Temp\_MEI17802\VCRUNTIME140_1.dll

MD5 f8dfa78045620cf8a732e67d1b1eb53d
SHA1 ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256 a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512 ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

C:\Users\Admin\AppData\Local\Temp\_MEI17802\unicodedata.pyd

MD5 04f35d7eec1f6b72bab9daf330fd0d6b
SHA1 ecf0c25ba7adf7624109e2720f2b5930cd2dba65
SHA256 be942308d99cc954931fe6f48ed8cc7a57891ccbe99aae728121bcda1fd929ab
SHA512 3da405e4c1371f4b265e744229dcc149491a112a2b7ea8e518d5945f8c259cad15583f25592b35ec8a344e43007ae00da9673822635ee734d32664f65c9c8d9b

C:\Users\Admin\AppData\Local\Temp\_MEI17802\sqlite3.dll

MD5 c1161c1cec57c5fff89d10b62a8e2c3a
SHA1 c4f5dea84a295ec3ff10307a0ea3ba8d150be235
SHA256 d1fd3040acddf6551540c2be6ff2e3738f7bd4dfd73f0e90a9400ff784dd15e6
SHA512 d545a6dc30f1d343edf193972833c4c69498dc4ea67278c996426e092834cb6d814ce98e1636c485f9b1c47ad5c68d6f432e304cd93ceed0e1e14feaf39b104a

C:\Users\Admin\AppData\Local\Temp\_MEI17802\pyexpat.pyd

MD5 f179c9bdd86a2a218a5bf9f0f1cf6cd9
SHA1 4544fb23d56cc76338e7f71f12f58c5fe89d0d76
SHA256 c42874e2cf034fb5034f0be35f7592b8a96e8903218da42e6650c504a85b37cc
SHA512 3464ece5c6a0e95ef6136897b70a96c69e552d28bfedd266f13eec840e36ec2286a1fb8973b212317de6fe3e93d7d7cc782eb6fc3d6a2a8f006b34f6443498de

C:\Users\Admin\AppData\Local\Temp\_MEI17802\libssl-3.dll

MD5 19a2aba25456181d5fb572d88ac0e73e
SHA1 656ca8cdfc9c3a6379536e2027e93408851483db
SHA256 2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512 df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

C:\Users\Admin\AppData\Local\Temp\_MEI17802\libcrypto-3.dll

MD5 7ccae1d3b28ec51f290dcadbf544e260
SHA1 9c000700de824350ce940bf195e8282b053d8cc7
SHA256 a788191c24eecb7ccf497a6808de5682bd72f3c4118b452fe6f4d9ffac62a333
SHA512 a513ceca24e259a79a163c45825b415af7b68c7cf57efb2f92d92c71a02b6970369c4ea1f1f9dfd05eef279b82ffc09c8cc9dc70ed0eb0bf44577bae90b431a6

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_lzma.pyd

MD5 b71dbe0f137ffbda6c3a89d5bcbf1017
SHA1 a2e2bdc40fdb83cc625c5b5e8a336ca3f0c29c5f
SHA256 6216173194b29875e84963cd4dc4752f7ca9493f5b1fd7e4130ca0e411c8ac6a
SHA512 9a5c7b1e25d8e1b5738f01aedfd468c1837f1ac8dd4a5b1d24ce86dcae0db1c5b20f2ff4280960bc523aee70b71db54fd515047cdaf10d21a8bec3ebd6663358

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_bz2.pyd

MD5 59d60a559c23202beb622021af29e8a9
SHA1 a405f23916833f1b882f37bdbba2dd799f93ea32
SHA256 706d4a0c26dd454538926cbb2ff6c64257c3d9bd48c956f7cabd6def36ffd13e
SHA512 2f60e79603cf456b2a14b8254cec75ce8be0a28d55a874d4fb23d92d63bbe781ed823ab0f4d13a23dc60c4df505cbf1dbe1a0a2049b02e4bdec8d374898002b1

C:\Users\Admin\AppData\Local\Temp\_MEI17802\_ctypes.pyd

MD5 2a834c3738742d45c0a06d40221cc588
SHA1 606705a593631d6767467fb38f9300d7cd04ab3e
SHA256 f20dfa748b878751ea1c4fe77a230d65212720652b99c4e5577bce461bbd9089
SHA512 924235a506ce4d635fa7c2b34e5d8e77eff73f963e58e29c6ef89db157bf7bab587678bb2120d09da70594926d82d87dbaa5d247e861e331cf591d45ea19a117

memory/1740-138-0x0000000073940000-0x0000000073EF1000-memory.dmp

memory/3948-139-0x0000000073940000-0x0000000073EF1000-memory.dmp

memory/3948-140-0x0000000000B00000-0x0000000000B10000-memory.dmp

memory/3948-141-0x0000000073940000-0x0000000073EF1000-memory.dmp

C:\Users\Admin\AppData\Roaming\app

MD5 cac4598fdc0f92181616d12833eb6ca1
SHA1 80a7b7a46a0e8e674b782b9eb569e5430a69c84b
SHA256 275918973c23ad700f278c69cc03c9c82ec9f4d9ed0f53111ad22bec197ff440
SHA512 01a7556bfcce6d9d8251aadc7f6e6169fdd0477d487ce88729c44bfe8b85b2eee500985d553c0479765ef5b5c6dc3517c0305efb9089814c3f8a9ea6fc51c713

C:\Users\Admin\AppData\Local\Temp\_MEI17802\libcrypto-3.dll

MD5 e547cf6d296a88f5b1c352c116df7c0c
SHA1 cafa14e0367f7c13ad140fd556f10f320a039783
SHA256 05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA512 9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

memory/4192-185-0x00007FFBEED50000-0x00007FFBEF811000-memory.dmp

memory/4192-186-0x0000024F41BC0000-0x0000024F41BD0000-memory.dmp

memory/4192-187-0x0000024F41BC0000-0x0000024F41BD0000-memory.dmp

memory/4192-196-0x0000024F29610000-0x0000024F29632000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jo5stqy1.jfb.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4192-198-0x0000024F41BC0000-0x0000024F41BD0000-memory.dmp