Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-04-2024 08:02

General

  • Target

    z.py

  • Size

    944B

  • MD5

    53208bd6bf45b2bab3cd17d972b7bcc0

  • SHA1

    5b269abcb7f3ff5306517bc16bd0cdb9e4159837

  • SHA256

    7aa64aad2b06dfed71dca4bcd403d9fe8e1a6d12b10a05eee75d8c00afb1fe63

  • SHA512

    426398bff0cd9d34656cdede15b251ca1d5bf3a9b110cf35f7395f81bc4b2bda42e04667d008e2164d1c6709fd1ebfec95570211d55b1b5d93e8e74e3a13b236

Malware Config

Extracted

Family

xenorat

C2

6.tcp.ngrok.io

Mutex

fdsfdsfsdfsdfnd8912d

Attributes
  • delay

    1000

  • install_path

    appdata

  • port

    17147

  • startup_name

    Intel Processor ©

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 45 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 6 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\z.py
    1⤵
    • Modifies registry class
    PID:2516
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3488
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3976
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffd60c846f8,0x7ffd60c84708,0x7ffd60c84718
      2⤵
        PID:528
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
        2⤵
          PID:4336
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4828
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:8
          2⤵
            PID:1320
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
            2⤵
              PID:4644
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
              2⤵
                PID:4908
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:1
                2⤵
                  PID:112
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:1
                  2⤵
                    PID:4680
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 /prefetch:8
                    2⤵
                      PID:1492
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1652
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1
                      2⤵
                        PID:1516
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                        2⤵
                          PID:4880
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5332 /prefetch:8
                          2⤵
                            PID:4524
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3860 /prefetch:8
                            2⤵
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2084
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                            2⤵
                              PID:4108
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:1
                              2⤵
                                PID:4596
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:1
                                2⤵
                                  PID:4760
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:1
                                  2⤵
                                    PID:912
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:1
                                    2⤵
                                      PID:744
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:1
                                      2⤵
                                        PID:1556
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:1
                                        2⤵
                                          PID:760
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:1
                                          2⤵
                                            PID:5052
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:1
                                            2⤵
                                              PID:4924
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:1
                                              2⤵
                                                PID:1984
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:1
                                                2⤵
                                                  PID:4720
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:1
                                                  2⤵
                                                    PID:5220
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2456 /prefetch:1
                                                    2⤵
                                                      PID:5292
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:1
                                                      2⤵
                                                        PID:5552
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6564 /prefetch:1
                                                        2⤵
                                                          PID:5680
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:1
                                                          2⤵
                                                            PID:5776
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6724 /prefetch:8
                                                            2⤵
                                                              PID:5784
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6888 /prefetch:8
                                                              2⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5880
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3260473002668702575,3941015239140644291,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:2
                                                              2⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:4384
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:4984
                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                              1⤵
                                                                PID:3152
                                                              • C:\Windows\System32\rundll32.exe
                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                1⤵
                                                                  PID:4868
                                                                • C:\Program Files\7-Zip\7zG.exe
                                                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\NixGenV1.6\" -ad -an -ai#7zMap15612:82:7zEvent14267
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:5168
                                                                • C:\Users\Admin\Downloads\NixGenV1.6\CalamityGen\NixGeneratorV1.6.EXE
                                                                  "C:\Users\Admin\Downloads\NixGenV1.6\CalamityGen\NixGeneratorV1.6.EXE"
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  PID:5308
                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\batman.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\batman.exe
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    PID:2216
                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\batman.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\batman.exe
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:3396
                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXE
                                                                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXE
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    • Adds Run key to start application
                                                                    PID:6076
                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\System32.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\System32.exe
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      PID:4344
                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\System32.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\System32.exe
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        PID:2528
                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\svchost.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\svchost.exe
                                                                      3⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      PID:4724
                                                                      • C:\Users\Admin\AppData\Roaming\XenoManager\svchost.exe
                                                                        "C:\Users\Admin\AppData\Roaming\XenoManager\svchost.exe"
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        PID:5428
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          "schtasks.exe" /Create /TN "Intel Processor ©" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE70F.tmp" /F
                                                                          5⤵
                                                                          • Creates scheduled task(s)
                                                                          PID:5520
                                                                • C:\Windows\system32\OpenWith.exe
                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                  1⤵
                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:4296
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                                                                  1⤵
                                                                  • Drops desktop.ini file(s)
                                                                  • Checks processor information in registry
                                                                  • Modifies registry class
                                                                  PID:5668
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                                                                  1⤵
                                                                  • Checks processor information in registry
                                                                  • Modifies registry class
                                                                  PID:4972
                                                                • C:\Windows\system32\NOTEPAD.EXE
                                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\NixGenV1.6\CalamityGen\validaccs.txt
                                                                  1⤵
                                                                  • Opens file in notepad (likely ransom note)
                                                                  PID:5420
                                                                • C:\Users\Admin\Downloads\NixGenV1.6\CalamityGen\NixGeneratorV1.6.EXE
                                                                  "C:\Users\Admin\Downloads\NixGenV1.6\CalamityGen\NixGeneratorV1.6.EXE"
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  PID:5648
                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\batman.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\batman.exe
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    PID:2524
                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\batman.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\batman.exe
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:5820
                                                                • C:\Windows\system32\OpenWith.exe
                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                  1⤵
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:5996
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                                                                  1⤵
                                                                  • Checks processor information in registry
                                                                  • Modifies registry class
                                                                  PID:3492

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                  Filesize

                                                                  152B

                                                                  MD5

                                                                  cbec32729772aa6c576e97df4fef48f5

                                                                  SHA1

                                                                  6ec173d5313f27ba1e46ad66c7bbe7c0a9767dba

                                                                  SHA256

                                                                  d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e

                                                                  SHA512

                                                                  425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                  Filesize

                                                                  152B

                                                                  MD5

                                                                  279e783b0129b64a8529800a88fbf1ee

                                                                  SHA1

                                                                  204c62ec8cef8467e5729cad52adae293178744f

                                                                  SHA256

                                                                  3619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932

                                                                  SHA512

                                                                  32730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  96c18578f09b8362bab9c2bb2ce4c0f0

                                                                  SHA1

                                                                  e8f255daa45fa5f6b983132f96e55e130c77be16

                                                                  SHA256

                                                                  fd95f194b5be49a66ebadc222700e393b78a66b55bef569dfd1d8308011b6f6e

                                                                  SHA512

                                                                  d4223e75b2aefacc9ea6f88a2a94f263e2feb283938297921ea5cec3dde41043ea5806be6dcc8230f94f627aa41ccbf4f75c95bba19ad69e61206d716a7be266

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  80cd4e1c63adb382c0a637d8f9c63aee

                                                                  SHA1

                                                                  1c36c654d3e58c2ad9d31837fafb00e6fa996eee

                                                                  SHA256

                                                                  dc72fea39e845cf7af21446d221ec7eddb4a7296320561ada599de4ecf475674

                                                                  SHA512

                                                                  673c0abf38eedc6e4e77a50206bf8db955ec4044d29f27094b41996059d93e324385762bec704946814d7867d00c31bdaeabe255c6dfa3a023480eaf98f08db0

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  7eea238f2e7243129295228f1f5109dc

                                                                  SHA1

                                                                  8edea8bd254817e16dfe75f1c7b40cc6f05035ac

                                                                  SHA256

                                                                  0d5b077c544227d3f64c34a7774692d5e6793acccb61516cc39ec32c5eacccda

                                                                  SHA512

                                                                  3bfc311b4cceb3d46282d106097660f3df67089c181e5ea3820305cd2ca96ece35db061c90cb4529eae9260e0fcd582863807f11863f3a54ad34b27e1d1ccc4d

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                  Filesize

                                                                  111B

                                                                  MD5

                                                                  285252a2f6327d41eab203dc2f402c67

                                                                  SHA1

                                                                  acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                  SHA256

                                                                  5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                  SHA512

                                                                  11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  7KB

                                                                  MD5

                                                                  7c24250040cc0f184d0cdb385435bdd8

                                                                  SHA1

                                                                  b6535ae9ff451a660899e17ea07df4883bdfa36f

                                                                  SHA256

                                                                  f813b8a2c171f4dd303b8ba40feb3bdce2bd4027df6df58718861ff96361aff3

                                                                  SHA512

                                                                  d600c64542ba45db5dfd9ef842fdd478294c6fb829ae7069b6c59b636b01401f0ccb1498a28d5e9d13944fecab85c7c4fba49d657ef544405aa55c92dd501b72

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  6KB

                                                                  MD5

                                                                  e67f0c6278e1fa818a6da26605773742

                                                                  SHA1

                                                                  cc40d6a6054a63bb7ba1c8efc101cb533ec1e342

                                                                  SHA256

                                                                  47edaf2761408c1d84374ea3e50003deaf11cd7008c176c253bcf3747ac51d41

                                                                  SHA512

                                                                  6fedcfafae636ab52d1376273d5c293f70f964680e12784a19924b20890f2e7d54806154a94864ac9778418055e4cc3262b35a6036883941abac651d3153d678

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  7KB

                                                                  MD5

                                                                  ce5cdf8530c1a71d09ae734c9bd1c51c

                                                                  SHA1

                                                                  5a189322ed6095b18bc70f9a1b12c770cb535105

                                                                  SHA256

                                                                  89016acb4d3c7235aef913e899474c0dd16c5c5bd647a1722b4780959268b8be

                                                                  SHA512

                                                                  ad039ed68bcd91c405d23677031fd9e60bee8879c7a466be45892beacc6e46332f2c6a0512d1be015504537b994f5bcddc9895fb9b855d68f6374a8852d3e2b7

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  6KB

                                                                  MD5

                                                                  8ce8f9f48ba152dbe3fbe6a1b89fb18a

                                                                  SHA1

                                                                  d50e300f9d6ee00035a90a47d7744908e31ebf6d

                                                                  SHA256

                                                                  2171bb8e48ec72c66ab2d0d967f88e8f76f63612872cef03bad26e4abf619c6f

                                                                  SHA512

                                                                  95a5a0bca80dba4704178988005efcb4939335c2ac6043edb24b4a4c197de548fa171e0cd77ed51b9ef1cc437569b21d3f995c5adb6a893ee2558901ff848d0e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  3d53e603654a5c8b4759706877143a1f

                                                                  SHA1

                                                                  acadf57a3d5ae902bcc3c301804d8c1586f0a036

                                                                  SHA256

                                                                  9915f44d40a10b235981fc1d012f26023ea1e80ed1f5d9f2606e904af563d9a2

                                                                  SHA512

                                                                  d9f40cfe863100da0ca60ff64e6a14594ec3f7f22f399c1c177c0e479ee54a7ab0e7993dbfc1c5452a356a8edf61279006c6d7509af3ebe21d77ec2866ea3aa5

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe580981.TMP

                                                                  Filesize

                                                                  873B

                                                                  MD5

                                                                  25987a0e258f486fc883c7990dc58e53

                                                                  SHA1

                                                                  203f3d55631350671307ef0b9cd966d7d02802f9

                                                                  SHA256

                                                                  a9e63cbb9a9fcf919a1b60e86a21ec27f8d83b78fd0c4ff6b3f032fa96d5aea6

                                                                  SHA512

                                                                  b2de2e8a6c877902f73a1b6f725cff0de0028d6a709391e647a9497222043c0f45db90c02e52be232639d567025b4bd36c2449a8786decf370da39c42be1bac1

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                  Filesize

                                                                  16B

                                                                  MD5

                                                                  6752a1d65b201c13b62ea44016eb221f

                                                                  SHA1

                                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                  SHA256

                                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                  SHA512

                                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  11KB

                                                                  MD5

                                                                  5bff2d1d2b87e3298c76b6dd4160e211

                                                                  SHA1

                                                                  ef2266216c74653e35cd924f5f868adec3594ee4

                                                                  SHA256

                                                                  3e3155ab52ee4f9ca8201a8dbae20893177708f4d150e21c0be619278efc156f

                                                                  SHA512

                                                                  b34b249646ad833fcdf5dcff0e2339d48a8c50ef1d759aeaf3635cd381a0d0634ad14c03ba408013ef0537fed11250265ab70833402046a716c2ce5289c4600b

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  12KB

                                                                  MD5

                                                                  35c42acf31a4cda89e8bb90798e881d9

                                                                  SHA1

                                                                  8297fbe1a07d0fb7cca1a97754aec8df894b21ea

                                                                  SHA256

                                                                  8c97eb25a46bd3349a7c59dd6feb8367aac497b73dd313f4c263beea33619e7b

                                                                  SHA512

                                                                  2186295b6889403e9490888ef0a67c7778886004546a96188ef86723af2801b2e76d5edef211c6693f6aa7655d4b7ae3bdd997bc6afdbbf14563bd92a5ef6a1f

                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXE

                                                                  Filesize

                                                                  9.4MB

                                                                  MD5

                                                                  66d4b34a620496eef746ff9877a19153

                                                                  SHA1

                                                                  364957fe3636d9802141a5ad80dbef80b14c274a

                                                                  SHA256

                                                                  88920d4fc74333ad6d6d67f37ff75afc127147a93246c67f099aca85e3f7e69f

                                                                  SHA512

                                                                  0d933482d766ba207282823f44e985fa68aa345430efca229cd08eb90dc2660abfe819628d558f8b50ab07b180ea5447f24ad64e9909c7ac45f3f5b490776c23

                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\batman.exe

                                                                  Filesize

                                                                  6.9MB

                                                                  MD5

                                                                  7b3510a146d873fa1dcee59e5354658b

                                                                  SHA1

                                                                  0f597ce829f34be0941169f8a1454912d04aacc0

                                                                  SHA256

                                                                  07136f26cf3a35ff1c5edac09ffe5df127340b519f92aab58eb2472e66f3600c

                                                                  SHA512

                                                                  88ec0004e7515a0795f0d291038eebacc3c9b85733913834d6f176bc053642e2637b6d5c9af7f915aca2e4a5210e4c51ac407adce389e6ba54d97bd1a632badf

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\VCRUNTIME140.dll

                                                                  Filesize

                                                                  96KB

                                                                  MD5

                                                                  f12681a472b9dd04a812e16096514974

                                                                  SHA1

                                                                  6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                                                  SHA256

                                                                  d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                                                  SHA512

                                                                  7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-console-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  40ba4a99bf4911a3bca41f5e3412291f

                                                                  SHA1

                                                                  c9a0e81eb698a419169d462bcd04d96eaa21d278

                                                                  SHA256

                                                                  af0e561bb3b2a13aa5ca9dfc9bc53c852bad85075261af6ef6825e19e71483a6

                                                                  SHA512

                                                                  f11b98ff588c2e8a88fdd61d267aa46dc5240d8e6e2bfeea174231eda3affc90b991ff9aae80f7cea412afc54092de5857159569496d47026f8833757c455c23

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-datetime-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  c5e3e5df803c9a6d906f3859355298e1

                                                                  SHA1

                                                                  0ecd85619ee5ce0a47ff840652a7c7ef33e73cf4

                                                                  SHA256

                                                                  956773a969a6213f4685c21702b9ed5bd984e063cf8188acbb6d55b1d6ccbd4e

                                                                  SHA512

                                                                  deedef8eaac9089f0004b6814862371b276fbcc8df45ba7f87324b2354710050d22382c601ef8b4e2c5a26c8318203e589aa4caf05eb2e80e9e8c87fd863dfc9

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-debug-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  71f1d24c7659171eafef4774e5623113

                                                                  SHA1

                                                                  8712556b19ed9f80b9d4b6687decfeb671ad3bfe

                                                                  SHA256

                                                                  c45034620a5bb4a16e7dd0aff235cc695a5516a4194f4fec608b89eabd63eeef

                                                                  SHA512

                                                                  0a14c03365adb96a0ad539f8e8d8333c042668046cea63c0d11c75be0a228646ea5b3fbd6719c29580b8baaeb7a28dc027af3de10082c07e089cdda43d5c467a

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-errorhandling-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  f1534c43c775d2cceb86f03df4a5657d

                                                                  SHA1

                                                                  9ed81e2ad243965e1090523b0c915e1d1d34b9e1

                                                                  SHA256

                                                                  6e6bfdc656f0cf22fabba1a25a42b46120b1833d846f2008952fe39fe4e57ab2

                                                                  SHA512

                                                                  62919d33c7225b7b7f97faf4a59791f417037704eb970cb1cb8c50610e6b2e86052480cdba771e4fad9d06454c955f83ddb4aea2a057725385460617b48f86a7

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-file-l1-1-0.dll

                                                                  Filesize

                                                                  25KB

                                                                  MD5

                                                                  ea00855213f278d9804105e5045e2882

                                                                  SHA1

                                                                  07c6141e993b21c4aa27a6c2048ba0cff4a75793

                                                                  SHA256

                                                                  f2f74a801f05ab014d514f0f1d0b3da50396e6506196d8beccc484cd969621a6

                                                                  SHA512

                                                                  b23b78b7bd4138bb213b9a33120854249308bb2cf0d136676174c3d61852a0ac362271a24955939f04813cc228cd75b3e62210382a33444165c6e20b5e0a7f24

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-file-l1-2-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  bcb8b9f6606d4094270b6d9b2ed92139

                                                                  SHA1

                                                                  bd55e985db649eadcb444857beed397362a2ba7b

                                                                  SHA256

                                                                  fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118

                                                                  SHA512

                                                                  869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-file-l2-1-0.dll

                                                                  Filesize

                                                                  18KB

                                                                  MD5

                                                                  bfffa7117fd9b1622c66d949bac3f1d7

                                                                  SHA1

                                                                  402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

                                                                  SHA256

                                                                  1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

                                                                  SHA512

                                                                  b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-handle-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  d584c1e0f0a0b568fce0efd728255515

                                                                  SHA1

                                                                  2e5ce6d4655c391f2b2f24fc207fdf0e6cd0cc2a

                                                                  SHA256

                                                                  3de40a35254e3e0e0c6db162155d5e79768a6664b33466bf603516f3743efb18

                                                                  SHA512

                                                                  c7d1489bf81e552c022493bb5a3cd95ccc81dbedaaa8fdc0048cacbd087913f90b366eeb4bf72bf4a56923541d978b80d7691d96dbbc845625f102c271072c42

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-heap-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  6168023bdb7a9ddc69042beecadbe811

                                                                  SHA1

                                                                  54ee35abae5173f7dc6dafc143ae329e79ec4b70

                                                                  SHA256

                                                                  4ea8399debe9d3ae00559d82bc99e4e26f310934d3fd1d1f61177342cf526062

                                                                  SHA512

                                                                  f1016797f42403bb204d4b15d75d25091c5a0ab8389061420e1e126d2214190a08f02e2862a2ae564770397e677b5bcdd2779ab948e6a3e639aa77b94d0b3f6c

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-interlocked-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  4f631924e3f102301dac36b514be7666

                                                                  SHA1

                                                                  b3740a0acdaf3fba60505a135b903e88acb48279

                                                                  SHA256

                                                                  e2406077621dce39984da779f4d436c534a31c5e863db1f65de5939d962157af

                                                                  SHA512

                                                                  56f9fb629675525cbe84a29d44105b9587a9359663085b62f3fbe3eea66451da829b1b6f888606bc79754b6b814ca4a1b215f04f301efe4db0d969187d6f76f1

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-libraryloader-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  8dfc224c610dd47c6ec95e80068b40c5

                                                                  SHA1

                                                                  178356b790759dc9908835e567edfb67420fbaac

                                                                  SHA256

                                                                  7b8c7e09030df8cdc899b9162452105f8baeb03ca847e552a57f7c81197762f2

                                                                  SHA512

                                                                  fe5be81bfce4a0442dd1901721f36b1e2efcdcee1fdd31d7612ad5676e6c5ae5e23e9a96b2789cb42b7b26e813347f0c02614937c561016f1563f0887e69bbee

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-localization-l1-2-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  20ddf543a1abe7aee845de1ec1d3aa8e

                                                                  SHA1

                                                                  0eaf5de57369e1db7f275a2fffd2d2c9e5af65bf

                                                                  SHA256

                                                                  d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8

                                                                  SHA512

                                                                  96dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-memory-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  c4098d0e952519161f4fd4846ec2b7fc

                                                                  SHA1

                                                                  8138ca7eb3015fc617620f05530e4d939cafbd77

                                                                  SHA256

                                                                  51b2103e0576b790d5f5fdacb42af5dac357f1fd37afbaaf4c462241c90694b4

                                                                  SHA512

                                                                  95aa4c7071bc3e3fa4db80742f587a0b80a452415c816003e894d2582832cf6eac645a26408145245d4deabe71f00eccf6adb38867206bedd5aa0a6413d241f5

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-namedpipe-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  eaf36a1ead954de087c5aa7ac4b4adad

                                                                  SHA1

                                                                  9dd6bc47e60ef90794a57c3a84967b3062f73c3c

                                                                  SHA256

                                                                  cdba9dc9af63ebd38301a2e7e52391343efeb54349fc2d9b4ee7b6bf4f9cf6eb

                                                                  SHA512

                                                                  1af9e60bf5c186ced5877a7fa690d9690b854faa7e6b87b0365521eafb7497fb7370ac023db344a6a92db2544b5bdc6e2744c03b10c286ebbf4f57c6ca3722cf

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-processenvironment-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  8711e4075fa47880a2cb2bb3013b801a

                                                                  SHA1

                                                                  b7ceec13e3d943f26def4c8a93935315c8bb1ac3

                                                                  SHA256

                                                                  5bcc3a2d7d651bb1ecc41aa8cd171b5f2b634745e58a8503b702e43aee7cd8c6

                                                                  SHA512

                                                                  7370e4acb298b2e690ccd234bd6c95e81a5b870ae225bc0ad8fa80f4473a85e44acc6159502085fe664075afa940cff3de8363304b66a193ac970ced1ba60aae

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-processthreads-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  8e6eb11588fa9625b68960a46a9b1391

                                                                  SHA1

                                                                  ff81f0b3562e846194d330fadf2ab12872be8245

                                                                  SHA256

                                                                  ae56e19da96204e7a9cdc0000f96a7ef15086a9fe1f686687cb2d6fbcb037cd6

                                                                  SHA512

                                                                  fdb97d1367852403245fc82cb1467942105e4d9db0de7cf13a73658905139bb9ae961044beb0a0870429a1e26fe00fc922fbd823bd43f30f825863cad2c22cea

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-processthreads-l1-1-1.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  4380d56a3b83ca19ea269747c9b8302b

                                                                  SHA1

                                                                  0c4427f6f0f367d180d37fc10ecbe6534ef6469c

                                                                  SHA256

                                                                  a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a

                                                                  SHA512

                                                                  1c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-profile-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  9082d23943b0aa48d6af804a2f3609a2

                                                                  SHA1

                                                                  c11b4e12b743e260e8b3c22c9face83653d02efe

                                                                  SHA256

                                                                  7ecc2e3fe61f9166ff53c28d7cb172a243d94c148d3ef13545bc077748f39267

                                                                  SHA512

                                                                  88434a2b996ed156d5effbb7960b10401831e9b2c9421a0029d2d8fa651b9411f973e988565221894633e9ffcd6512f687afbb302efe2273d4d1282335ee361d

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-rtlsupport-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  772f1b596a7338f8ea9ddff9aba9447d

                                                                  SHA1

                                                                  cda9f4b9808e9cef2aeac2ac6e7cdf0e8687c4c5

                                                                  SHA256

                                                                  cc1bfce8fe6f9973cca15d7dfcf339918538c629e6524f10f1931ae8e1cd63b4

                                                                  SHA512

                                                                  8c94890c8f0e0a8e716c777431022c2f77b69ebfaa495d541e2d3312ae1da307361d172efce94590963d17fe3fcac8599dcabe32ab56e01b4d9cf9b4f0478277

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-string-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  84b1347e681e7c8883c3dc0069d6d6fa

                                                                  SHA1

                                                                  9e62148a2368724ca68dfa5d146a7b95c710c2f2

                                                                  SHA256

                                                                  1cb48031891b967e2f93fdd416b0324d481abde3838198e76bc2d0ca99c4fd09

                                                                  SHA512

                                                                  093097a49080aec187500e2a9e9c8ccd01f134a3d8dc8ab982e9981b9de400dae657222c20fb250368ecddc73b764b2f4453ab84756b908fcb16df690d3f4479

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-synch-l1-1-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  6ea31229d13a2a4b723d446f4242425b

                                                                  SHA1

                                                                  036e888b35281e73b89da1b0807ea8e89b139791

                                                                  SHA256

                                                                  8eccaba9321df69182ee3fdb8fc7d0e7615ae9ad3b8ca53806ed47f4867395ae

                                                                  SHA512

                                                                  fa834e0e54f65d9a42ad1f4fb1086d26edfa182c069b81cff514feb13cfcb7cb5876508f1289efbc2d413b1047d20bab93ced3e5830bf4a6bb85468decd87cb6

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\api-ms-win-core-synch-l1-2-0.dll

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  dd6f223b4f9b84c6e9b2a7cf49b84fc7

                                                                  SHA1

                                                                  2ee75d635d21d628e8083346246709a71b085710

                                                                  SHA256

                                                                  8356f71c5526808af2896b2d296ce14e812e4585f4d0c50d7648bc851b598bef

                                                                  SHA512

                                                                  9c12912daea5549a3477baa2cd05180702cf24dd185be9f1fca636db6fbd25950c8c2b83f18d093845d9283c982c0255d6402e3cdea0907590838e0acb8cc8c1

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\base_library.zip

                                                                  Filesize

                                                                  1.4MB

                                                                  MD5

                                                                  83d235e1f5b0ee5b0282b5ab7244f6c4

                                                                  SHA1

                                                                  629a1ce71314d7abbce96674a1ddf9f38c4a5e9c

                                                                  SHA256

                                                                  db389a9e14bfac6ee5cce17d41f9637d3ff8b702cc74102db8643e78659670a0

                                                                  SHA512

                                                                  77364aff24cfc75ee32e50973b7d589b4a896d634305d965ecbc31a9e0097e270499dbec93126092eb11f3f1ad97692db6ca5927d3d02f3d053336d6267d7e5f

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\python311.dll

                                                                  Filesize

                                                                  5.5MB

                                                                  MD5

                                                                  9a24c8c35e4ac4b1597124c1dcbebe0f

                                                                  SHA1

                                                                  f59782a4923a30118b97e01a7f8db69b92d8382a

                                                                  SHA256

                                                                  a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

                                                                  SHA512

                                                                  9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI22162\ucrtbase.dll

                                                                  Filesize

                                                                  992KB

                                                                  MD5

                                                                  0e0bac3d1dcc1833eae4e3e4cf83c4ef

                                                                  SHA1

                                                                  4189f4459c54e69c6d3155a82524bda7549a75a6

                                                                  SHA256

                                                                  8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

                                                                  SHA512

                                                                  a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

                                                                • C:\Users\Admin\AppData\Roaming\XenoManager\svchost.exe

                                                                  Filesize

                                                                  45KB

                                                                  MD5

                                                                  7718d23c6ae306151079b534eee6b7f6

                                                                  SHA1

                                                                  4806ed5d1136df0e2c499192cea7f122164a0028

                                                                  SHA256

                                                                  701212841c7d28cddc7cc4f4958d7117607a89556bc581a00084981a0e34f265

                                                                  SHA512

                                                                  d84bab8c02367fcfdcdf4d903f54e637cb7cf2bdb46f4b4d68b53ba38e63e5a97097fececf3645ef45ec33341b872a47342b721bcf558a1f7ec0d34f5f6a3a62

                                                                • C:\Users\Admin\Downloads\NixGenV1.6\CalamityGen\NixGeneratorV1.6.EXE

                                                                  Filesize

                                                                  16.3MB

                                                                  MD5

                                                                  6e7131a44583510796939fdb6d3f8336

                                                                  SHA1

                                                                  a9561807164c4e314a1919302152e7d0ad93de9f

                                                                  SHA256

                                                                  d93036658988a42db990361c45fbe6ba21c143f51f8a452ff81d707a6080e45a

                                                                  SHA512

                                                                  a93d8e85262b30024a7161bbaf2d6af1a71d99aeb024a7d95ca2ea3feed2970c8a68ae81373a2f6329196543daaa9c7f5d5503eac7606c98919c5cccce636272

                                                                • C:\Users\Admin\Downloads\Unconfirmed 239011.crdownload

                                                                  Filesize

                                                                  12.3MB

                                                                  MD5

                                                                  6ddd641c9219a9611b530375551ded09

                                                                  SHA1

                                                                  011e22abc8ce6235230c19958c3471b30a4ac5f2

                                                                  SHA256

                                                                  f307aaaf1e34438d40dcc6672323c40e6dd738adc32698ddcdf6d690586e9607

                                                                  SHA512

                                                                  092dfc004f0ef29e064836dc99d1381d9cbaff2345794a485027d1de9f1bdf50afccf097984cbc443c5395ef51375fae036ecd47327ec9c4cfc782bbe70a17c9

                                                                • C:\Users\Admin\Videos\Captures\desktop.ini

                                                                  Filesize

                                                                  190B

                                                                  MD5

                                                                  b0d27eaec71f1cd73b015f5ceeb15f9d

                                                                  SHA1

                                                                  62264f8b5c2f5034a1e4143df6e8c787165fbc2f

                                                                  SHA256

                                                                  86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

                                                                  SHA512

                                                                  7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

                                                                • memory/4724-705-0x0000000000F40000-0x0000000000F52000-memory.dmp

                                                                  Filesize

                                                                  72KB

                                                                • memory/4724-706-0x0000000074410000-0x0000000074BC0000-memory.dmp

                                                                  Filesize

                                                                  7.7MB

                                                                • memory/4724-717-0x0000000074410000-0x0000000074BC0000-memory.dmp

                                                                  Filesize

                                                                  7.7MB

                                                                • memory/5428-718-0x0000000074410000-0x0000000074BC0000-memory.dmp

                                                                  Filesize

                                                                  7.7MB

                                                                • memory/5428-779-0x0000000074410000-0x0000000074BC0000-memory.dmp

                                                                  Filesize

                                                                  7.7MB