Malware Analysis Report

2024-09-22 07:05

Sample ID 240531-qbh7kshf8t
Target SeedsChecker.zip
SHA256 dc4aa0cfe4379b2ae5a8d10a81f7d04f45a8060765dad726a19ec0b2e881c7c9
Tags
asyncrat default rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

dc4aa0cfe4379b2ae5a8d10a81f7d04f45a8060765dad726a19ec0b2e881c7c9

Threat Level: Known bad

The file SeedsChecker.zip was found to be: Known bad.

Malicious Activity Summary

asyncrat default rat spyware stealer

AsyncRat

Async RAT payload

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

Reads user/profile data of web browsers

Enumerates physical storage devices

Unsigned PE

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Creates scheduled task(s)

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

Delays execution with timeout.exe

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-31 13:05

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-31 13:05

Reported

2024-05-31 13:06

Platform

win7-20240221-en

Max time kernel

31s

Max time network

20s

Command Line

"C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe"

Signatures

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2736 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe
PID 2736 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe
PID 2736 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe
PID 2736 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe
PID 2736 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe
PID 2736 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe
PID 2688 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe C:\Windows\system32\WerFault.exe
PID 2688 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe C:\Windows\system32\WerFault.exe
PID 2688 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe C:\Windows\system32\WerFault.exe
PID 2524 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe C:\Windows\system32\WerFault.exe
PID 2524 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe C:\Windows\system32\WerFault.exe
PID 2524 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe C:\Windows\system32\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe"

C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe"

C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2688 -s 92

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2524 -s 520

Network

N/A

Files

memory/2736-0-0x000007FEF6023000-0x000007FEF6024000-memory.dmp

memory/2736-1-0x00000000010F0000-0x0000000001B82000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe

MD5 6ff8156ec6df07062b3a9f9594604a2b
SHA1 608adce74f2461d853aa5dc7590dec9daa948019
SHA256 1fddeef51fb61303fcd232c0d7bd9bb45cf9d7b6a4377d8ccb479ae562ae79be
SHA512 f40aae3ead07bcdcc7ddd0e4800026b0f9a6f50b6f1f1338ada10d63c05eb6ec0d33cfa507227c0ff46ba63193014d73e6eadc03edd31490ee982546ad64aada

memory/2524-8-0x0000000000140000-0x000000000017A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe

MD5 2ebfecade19e4b41e1968a8b5e49f163
SHA1 2e419a0dd67f1532ce71091f3623f992ce94c21c
SHA256 6851f7b4b2fc51091056aeca5616be222cf212196bef0af705ee73ff068d94e2
SHA512 0e105a0b503abb526817aa982d2b709b1cfdc044aa01fd93613a8cc3ed96b4c772474099bbd66be00af2873760adbecf940fe65228f5aa085443492bb509fa1f

memory/2524-19-0x000007FEF6020000-0x000007FEF6A0C000-memory.dmp

memory/2736-18-0x000007FEF6020000-0x000007FEF6A0C000-memory.dmp

memory/2524-21-0x000007FEF6020000-0x000007FEF6A0C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-31 13:05

Reported

2024-05-31 13:06

Platform

win10v2004-20240426-en

Max time kernel

32s

Max time network

37s

Command Line

"C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe"

Signatures

AsyncRat

rat asyncrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Runtime.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Runtime.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Runtime.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3760 wrote to memory of 3756 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe
PID 3760 wrote to memory of 3756 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe
PID 3760 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe
PID 3760 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe
PID 2572 wrote to memory of 7796 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe
PID 2572 wrote to memory of 7796 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe
PID 3756 wrote to memory of 7064 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe C:\Windows\System32\cmd.exe
PID 3756 wrote to memory of 7064 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe C:\Windows\System32\cmd.exe
PID 3756 wrote to memory of 6992 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe C:\Windows\system32\cmd.exe
PID 3756 wrote to memory of 6992 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe C:\Windows\system32\cmd.exe
PID 7064 wrote to memory of 6844 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\schtasks.exe
PID 7064 wrote to memory of 6844 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\schtasks.exe
PID 6992 wrote to memory of 6836 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 6992 wrote to memory of 6836 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\timeout.exe
PID 6992 wrote to memory of 6668 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\Runtime.exe
PID 6992 wrote to memory of 6668 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\Runtime.exe
PID 7796 wrote to memory of 6496 N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe
PID 7796 wrote to memory of 6496 N/A C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe
PID 6496 wrote to memory of 392 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe
PID 6496 wrote to memory of 392 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe
PID 392 wrote to memory of 3144 N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe C:\Windows\System32\Wbem\wmic.exe
PID 392 wrote to memory of 3144 N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe C:\Windows\System32\Wbem\wmic.exe
PID 392 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe C:\Windows\System32\Wbem\wmic.exe
PID 392 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe C:\Windows\System32\Wbem\wmic.exe
PID 392 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe C:\Windows\System32\Wbem\wmic.exe
PID 392 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe C:\Windows\System32\Wbem\wmic.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe"

C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe"

C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe"

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Runtime" /tr '"C:\Users\Admin\AppData\Roaming\Runtime.exe"' & exit

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp609E.tmp.bat""

C:\Windows\system32\schtasks.exe

schtasks /create /f /sc onlogon /rl highest /tn "Runtime" /tr '"C:\Users\Admin\AppData\Roaming\Runtime.exe"'

C:\Windows\system32\timeout.exe

timeout 3

C:\Users\Admin\AppData\Roaming\Runtime.exe

"C:\Users\Admin\AppData\Roaming\Runtime.exe"

C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe"

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\module.exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe"

C:\Windows\System32\Wbem\wmic.exe

wmic csproduct get uuid

C:\Windows\System32\Wbem\wmic.exe

wmic csproduct get uuid

C:\Windows\System32\Wbem\wmic.exe

wmic csproduct get uuid

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
NL 80.79.7.197:8808 tcp
US 8.8.8.8:53 197.7.79.80.in-addr.arpa udp
NL 80.79.7.197:6606 tcp
US 8.8.8.8:53 blood-mlood-app.onrender.com udp
US 216.24.57.4:443 blood-mlood-app.onrender.com tcp
US 216.24.57.4:80 blood-mlood-app.onrender.com tcp
US 216.24.57.4:443 blood-mlood-app.onrender.com tcp
US 8.8.8.8:53 4.57.24.216.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp

Files

memory/3760-0-0x00007FFEB31D3000-0x00007FFEB31D5000-memory.dmp

memory/3760-1-0x0000000000B00000-0x0000000001592000-memory.dmp

memory/3760-4-0x00007FFEB31D0000-0x00007FFEB3C91000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe

MD5 6ff8156ec6df07062b3a9f9594604a2b
SHA1 608adce74f2461d853aa5dc7590dec9daa948019
SHA256 1fddeef51fb61303fcd232c0d7bd9bb45cf9d7b6a4377d8ccb479ae562ae79be
SHA512 f40aae3ead07bcdcc7ddd0e4800026b0f9a6f50b6f1f1338ada10d63c05eb6ec0d33cfa507227c0ff46ba63193014d73e6eadc03edd31490ee982546ad64aada

memory/3756-15-0x0000000000E30000-0x0000000000E6A000-memory.dmp

memory/3756-20-0x0000000002EC0000-0x0000000002ED6000-memory.dmp

memory/3756-21-0x00007FFEB31D0000-0x00007FFEB3C91000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe

MD5 2ebfecade19e4b41e1968a8b5e49f163
SHA1 2e419a0dd67f1532ce71091f3623f992ce94c21c
SHA256 6851f7b4b2fc51091056aeca5616be222cf212196bef0af705ee73ff068d94e2
SHA512 0e105a0b503abb526817aa982d2b709b1cfdc044aa01fd93613a8cc3ed96b4c772474099bbd66be00af2873760adbecf940fe65228f5aa085443492bb509fa1f

memory/3760-54-0x00007FFEB31D0000-0x00007FFEB3C91000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\python38.dll

MD5 d2a8a5e7380d5f4716016777818a32c5
SHA1 fb12f31d1d0758fe3e056875461186056121ed0c
SHA256 59ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9
SHA512 ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\SeedsChecker.exe

MD5 f46c6782a9eec72a6eabc539216470d6
SHA1 945b6d3101eed852c6071da599f5b21e5ff58f85
SHA256 603abcd38abeda40aa679c7ed68537a214fd7a6aeda50f06ba6954ca42e888d5
SHA512 8ffae1ec373cf806fcb81c12782436e2bee49cd74b6841bc00dc93bc9a005e844d801da314333b3ef0b2aeee83a6fe0688b93376f1b6142cb46f15aa8fb816ed

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\VCRUNTIME140.dll

MD5 0e675d4a7a5b7ccd69013386793f68eb
SHA1 6e5821ddd8fea6681bda4448816f39984a33596b
SHA256 bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512 cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\tk86t.dll

MD5 fdc8a5d96f9576bd70aa1cadc2f21748
SHA1 bae145525a18ce7e5bc69c5f43c6044de7b6e004
SHA256 1a6d0871be2fa7153de22be008a20a5257b721657e6d4b24da8b1f940345d0d5
SHA512 816ada61c1fd941d10e6bb4350baa77f520e2476058249b269802be826bab294a9c18edc5d590f5ed6f8dafed502ab7ffb29db2f44292cb5bedf2f5fa609f49c

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\tcl86t.dll

MD5 c0b23815701dbae2a359cb8adb9ae730
SHA1 5be6736b645ed12e97b9462b77e5a43482673d90
SHA256 f650d6bc321bcda3fc3ac3dec3ac4e473fb0b7b68b6c948581bcfc54653e6768
SHA512 ed60384e95be8ea5930994db8527168f78573f8a277f8d21c089f0018cd3b9906da764ed6fcc1bd4efad009557645e206fbb4e5baef9ab4b2e3c8bb5c3b5d725

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\_tkinter.pyd

MD5 7244bcee3ec369a9c503d16e5dfd2715
SHA1 d3b126e07df3a6d902b12def8151957be9ca1b03
SHA256 6b40fe9ecc1b1749c174069f421143c63e87486294af39bbe83fbd6be797c0a1
SHA512 6e49dc62f4dfe61eecb25e98f8eb3685afa53c7d5b05ac48139721778a8224f85bc74bee6f29974c6fc2cebd20f0f6628b73ebf168bf8cff80b21d24a83ff92d

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\libffi-7.dll

MD5 4424baf6ed5340df85482fa82b857b03
SHA1 181b641bf21c810a486f855864cd4b8967c24c44
SHA256 8c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79
SHA512 8adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\customtkinter\assets\themes\blue.json

MD5 73f7bc39123ecaf46c6f682fc20509ac
SHA1 6ad3708cc6b59c138de6bb6e33d2072e2c0d2465
SHA256 89d76b8220a03a4ed4affac37d6aaeffa11f8aadb08138af42d6d0a451f2ddd8
SHA512 3bf016b98aad2b821b5767a7be3cf045bf13f543b30eab141543df47d4fd1c3653ac02cc825b00401594871ba5778fb63d0853f0fec061fd86e9a583c7d060c3

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\_ctypes.pyd

MD5 f1e33a8f6f91c2ed93dc5049dd50d7b8
SHA1 23c583dc98aa3f6b8b108db5d90e65d3dd72e9b4
SHA256 9459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4
SHA512 229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tcl\encoding\cp1252.enc

MD5 5900f51fd8b5ff75e65594eb7dd50533
SHA1 2e21300e0bc8a847d0423671b08d3c65761ee172
SHA256 14df3ae30e81e7620be6bbb7a9e42083af1ae04d94cf1203565f8a3c0542ace0
SHA512 ea0455ff4cd5c0d4afb5e79b671565c2aede2857d534e1371f0c10c299c74cb4ad113d56025f58b8ae9e88e2862f0864a4836fed236f5730360b2223fde479dc

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\_bz2.pyd

MD5 3dc8af67e6ee06af9eec52fe985a7633
SHA1 1451b8c598348a0c0e50afc0ec91513c46fe3af6
SHA256 c55821f5fdb0064c796b2c0b03b51971f073140bc210cbe6ed90387db2bed929
SHA512 da16bfbc66c8abc078278d4d3ce1595a54c9ef43ae8837ceb35ae2f4757b930fe55e258827036eba8218315c10af5928e30cb22c60ff69159c8fe76327280087

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_lzma.pyd

MD5 37057c92f50391d0751f2c1d7ad25b02
SHA1 a43c6835b11621663fa251da421be58d143d2afb
SHA256 9442dc46829485670a6ac0c02ef83c54b401f1570d1d5d1d85c19c1587487764
SHA512 953dc856ad00c3aec6aeab3afa2deb24211b5b791c184598a2573b444761db2d4d770b8b807ebba00ee18725ff83157ec5fa2e3591a7756eb718eba282491c7c

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\select.pyd

MD5 6ae54d103866aad6f58e119d27552131
SHA1 bc53a92a7667fd922ce29e98dfcf5f08f798a3d2
SHA256 63b81af5d3576473c17ac929bea0add5bf8d7ea95c946caf66cbb9ad3f233a88
SHA512 ff23f3196a10892ea22b28ae929330c8b08ab64909937609b7af7bfb1623cd2f02a041fd9fab24e4bc1754276bdafd02d832c2f642c8ecdcb233f639bdf66dd0

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\_socket.pyd

MD5 d6bae4b430f349ab42553dc738699f0e
SHA1 7e5efc958e189c117eccef39ec16ebf00e7645a9
SHA256 587c4f3092b5f3e34f6b1e927ecc7127b3fe2f7fa84e8a3d0c41828583bd5cef
SHA512 a8f8fed5ea88e8177e291b708e44b763d105907e9f8c9e046c4eebb8684a1778383d1fba6a5fa863ca37c42fd58ed977e9bb3a6b12c5b8d9ab6ef44de75e3d1e

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tcl\init.tcl

MD5 b900811a252be90c693e5e7ae365869d
SHA1 345752c46f7e8e67dadef7f6fd514bed4b708fc5
SHA256 bc492b19308bc011cfcd321f1e6e65e6239d4eeb620cc02f7e9bf89002511d4a
SHA512 36b8cdba61b9222f65b055c0c513801f3278a3851912215658bcf0ce10f80197c1f12a5ca3054d8604da005ce08da8dcd303b8544706b642140a49c4377dd6ce

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\listbox.tcl

MD5 c33963d3a512f2e728f722e584c21552
SHA1 75499cfa62f2da316915fada2580122dc3318bad
SHA256 39721233855e97bfa508959b6dd91e1924456e381d36fdfc845e589d82b1b0cc
SHA512 ea01d8cb36d446ace31c5d7e50dfae575576fd69fd5d413941eebba7ccc1075f6774af3c69469cd7baf6e1068aa5e5b4c560f550edd2a8679124e48c55c8e8d7

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\entry.tcl

MD5 be28d16510ee78ecc048b2446ee9a11a
SHA1 4829d6e8ab8a283209fb4738134b03b7bd768bad
SHA256 8f57a23c5190b50fad00bdee9430a615ebebfc47843e702374ae21beb2ad8b06
SHA512 f56af7020531249bc26d88b977baffc612b6566146730a681a798ff40be9ebc04d7f80729bafe0b9d4fac5b0582b76f9530f3fe376d42a738c9bc4b3b442df1f

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\button.tcl

MD5 309ab5b70f664648774453bccbe5d3ce
SHA1 51bf685dedd21de3786fe97bc674ab85f34bd061
SHA256 0d95949cfacf0df135a851f7330acc9480b965dac7361151ac67a6c667c6276d
SHA512 d5139752bd7175747a5c912761916efb63b3c193dd133ad25d020a28883a1dea6b04310b751f5fcbe579f392a8f5f18ae556116283b3e137b4ea11a2c536ec6b

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\icons.tcl

MD5 2652aad862e8fe06a4eedfb521e42b75
SHA1 ed22459ad3d192ab05a01a25af07247b89dc6440
SHA256 a78388d68600331d06bb14a4289bc1a46295f48cec31ceff5ae783846ea4d161
SHA512 6ecfbb8d136444a5c0dbbce2d8a4206f1558bdd95f111d3587b095904769ac10782a9ea125d85033ad6532edf3190e86e255ac0c0c81dc314e02d95cca86b596

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tcl\opt0.4\pkgIndex.tcl

MD5 92ff1e42cfc5fecce95068fc38d995b3
SHA1 b2e71842f14d5422a9093115d52f19bcca1bf881
SHA256 eb9925a8f0fcc7c2a1113968ab0537180e10c9187b139c8371adf821c7b56718
SHA512 608d436395d055c5449a53208f3869b8793df267b8476ad31bcdd9659a222797814832720c495d938e34bf7d253ffc3f01a73cc0399c0dfb9c85d2789c7f11c0

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tcl\http1.0\pkgIndex.tcl

MD5 10ec7cd64ca949099c818646b6fae31c
SHA1 6001a58a0701dff225e2510a4aaee6489a537657
SHA256 420c4b3088c9dacd21bc348011cac61d7cb283b9bee78ae72eed764ab094651c
SHA512 34a0acb689e430ed2903d8a903d531a3d734cb37733ef13c5d243cb9f59c020a3856aad98726e10ad7f4d67619a3af1018f6c3e53a6e073e39bd31d088efd4af

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\pkgIndex.tcl

MD5 a6448af2c8fafc9a4f42eaca6bf6ab2e
SHA1 0b295b46b6df906e89f40a907022068bc6219302
SHA256 cd44ee7f76c37c0c522bd0cfca41c38cdeddc74392b2191a3af1a63d9d18888e
SHA512 5b1a8ca5b09b7281de55460d21d5195c4ee086bebdc35fa561001181490669ffc67d261f99eaa900467fe97e980eb733c5ffbf9d8c541ede18992bf4a435c749

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tcl\package.tcl

MD5 55e2db5dcf8d49f8cd5b7d64fea640c7
SHA1 8fdc28822b0cc08fa3569a14a8c96edca03bfbbd
SHA256 47b6af117199b1511f6103ec966a58e2fd41f0aba775c44692b2069f6ed10bad
SHA512 824c210106de7eae57a480e3f6e3a5c8fb8ac4bbf0a0a386d576d3eb2a3ac849bdfe638428184056da9e81767e2b63eff8e18068a1cf5149c9f8a018f817d3e5

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tcl8\8.5\msgcat-1.6.1.tm

MD5 db52847c625ea3290f81238595a915cd
SHA1 45a4ed9b74965e399430290bcdcd64aca5d29159
SHA256 4fdf70fdcedef97aa8bd82a02669b066b5dfe7630c92494a130fc7c627b52b55
SHA512 5a8fb4ada7b2efbf1cadd10dbe4dc7ea7acd101cb8fd0b80dad42be3ed8804fc8695c53e6aeec088c2d4c3ee01af97d148b836289da6e4f9ee14432b923c7e40

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tcl\tm.tcl

MD5 f9ed2096eea0f998c6701db8309f95a6
SHA1 bcdb4f7e3db3e2d78d25ed4e9231297465b45db8
SHA256 6437bd7040206d3f2db734fa482b6e79c68bcc950fba80c544c7f390ba158f9b
SHA512 e4fb8f28dc72ea913f79cedf5776788a0310608236d6607adc441e7f3036d589fd2b31c446c187ef5827fd37dcaa26d9e94d802513e3bf3300e94dd939695b30

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\tk.tcl

MD5 3250ec5b2efe5bbe4d3ec271f94e5359
SHA1 6a0fe910041c8df4f3cdc19871813792e8cc4e4c
SHA256 e1067a0668debb2d8e8ec3b7bc1aec3723627649832b20333f9369f28e4dfdbf
SHA512 f8e403f3d59d44333bce2aa7917e6d8115bec0fe5ae9a1306f215018b05056467643b7aa228154ddced176072bc903dfb556cb2638f5c55c1285c376079e8fe3

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tcl\auto.tcl

MD5 5e9b3e874f8fbeaadef3a004a1b291b5
SHA1 b356286005efb4a3a46a1fdd53e4fcdc406569d0
SHA256 f385515658832feb75ee4dce5bd53f7f67f2629077b7d049b86a730a49bd0840
SHA512 482c555a0da2e635fa6838a40377eef547746b2907f53d77e9ffce8063c1a24322d8faa3421fc8d12fdcaff831b517a65dafb1cea6f5ea010bdc18a441b38790

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tcl\tclIndex

MD5 e127196e9174b429cc09c040158f6aab
SHA1 ff850f5d1bd8efc1a8cb765fe8221330f0c6c699
SHA256 abf7d9d1e86de931096c21820bfa4fd70db1f55005d2db4aa674d86200867806
SHA512 c4b98ebc65e25df41e6b9a93e16e608cf309fa0ae712578ee4974d84f7f33bcf2a6ed7626e88a343350e13da0c5c1a88e24a87fcbd44f7da5983bb3ef036a162

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\menu.tcl

MD5 181ed74919f081eeb34269500e228470
SHA1 953eb429f6d98562468327858ed0967bdc21b5ad
SHA256 564ac0040176cc5744e3860abc36b5ffbc648da20b26a710dc3414eae487299b
SHA512 220e496b464575115baf1dede838e70d5ddd6d199b5b8acc1763e66d66801021b2d7cd0e1e1846868782116ad8a1f127682073d6eacd7e73f91bced89f620109

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\panedwindow.tcl

MD5 2da0a23cc9d6fd970fe00915ea39d8a2
SHA1 dfe3dc663c19e9a50526a513043d2393869d8f90
SHA256 4adf738b17691489c71c4b9d9a64b12961ada8667b81856f7adbc61dffeadf29
SHA512 b458f3d391df9522d4e7eae8640af308b4209ce0d64fd490bfc0177fde970192295c1ea7229ce36d14fc3e582c7649460b8b7b0214e0ff5629b2b430a99307d4

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\fonts.tcl

MD5 7017b5c1d53f341f703322a40c76c925
SHA1 57540c56c92cc86f94b47830a00c29f826def28e
SHA256 0eb518251fbe9cf0c9451cc1fef6bb6aee16d62da00b0050c83566da053f68d0
SHA512 fd18976a8fbb7e59b12944c2628dbd66d463b2f7342661c8f67160df37a393fa3c0ce7fdda31073674b7a46e0a0a7d0a7b29ebe0d9488afd9ef8b3a39410b5a8

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\ttk.tcl

MD5 e38b399865c45e49419c01ff2addce75
SHA1 f8a79cbc97a32622922d4a3a5694bccb3f19decb
SHA256 61baa0268770f127394a006340d99ce831a1c7ad773181c0c13122f7d2c5b7f6
SHA512 285f520b648f5ec70dd79190c3b456f4d6da2053210985f9e2c84139d8d51908296e4962b336894ee30536f09fae84b912bc2abf44a7011620f66cc5d9f71a8c

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\text.tcl

MD5 03cc27e28e0cfce1b003c3e936797ab0
SHA1 c7fe5ae7f35c86ec3724f6a111eaaf2c1a18abe9
SHA256 bccc1039f0eb331c4bb6bd5848051bb745f242016952723478c93b009f63d254
SHA512 5091b10ee8446e6853ef7060ec13ab8cada0d6448f9081febd07546c061f69fc273bbf23ba7af05d8359e618dd68a5c27f0453480fe3f26e744db19bfcd115c7

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\spinbox.tcl

MD5 9971530f110ac2fb7d7ec91789ea2364
SHA1 ab553213c092ef077524ed56fc37da29404c79a7
SHA256 5d6e939b44f630a29c4fcb1e2503690c453118607ff301bef3c07fa980d5075a
SHA512 81b4cec39b03fbeca59781aa54960f0a10a09733634f401d5553e1aaa3ebf12a110c9d555946fcdd70a9cc897514663840745241ad741dc440bb081a12dcf411

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\scrlbar.tcl

MD5 4cbffc4e6b3f56a5890e3f7c31c6c378
SHA1 75db5205b311f55d1ca1d863b8688a628bf6012a
SHA256 6ba3e2d62bd4856d7d7ae87709fcaa23d81efc38c375c6c5d91639555a84c35d
SHA512 65df7ae09e06c200a8456748dc89095bb8417253e01ec4fdafb28a84483147ddc77aaf6b49be9e18a326a94972086a99044bee3ce5cf8026337dfc6972c92c04

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\scale.tcl

MD5 1ce32cdaeb04c75bfceea5fb94b8a9f0
SHA1 cc7614c9eade999963ee78b422157b7b0739894c
SHA256 58c662dd3d2c653786b05aa2c88831f4e971b9105e4869d866fb6186e83ed365
SHA512 1ee5a187615ae32f17936931b30fea9551f9e3022c1f45a2bca81624404f4e68022fcf0b03fbd61820ec6958983a8f2fbfc3ad2ec158433f8e8de9b8fcf48476

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\cursors.tcl

MD5 74596004dfdbf2ecf6af9c851156415d
SHA1 933318c992b705bf9f8511621b4458ecb8772788
SHA256 7bdffa1c2692c5d1cf67b518f9acb32fa4b4d9936ed076f4db835943bc1a00d6
SHA512 0d600b21db67bf9dadbdd49559573078efb41e473e94124ac4d2551bc10ec764846dc1f7674daa79f8d2a8aeb4ca27a5e11c2f30ede47e3ecee77d60d7842262

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\utils.tcl

MD5 65193fe52d77b8726b75fbf909ee860a
SHA1 991dedd4666462dd9776fdf6c21f24d6cf794c85
SHA256 c7cc9a15cfa999cf3763772729cc59f629e7e060af67b7d783c50530b9b756e1
SHA512 e43989f5f368d2e19c9a3521fb82c6c1dd9eeb91df936a980ffc7674c8b236cb84e113908b8c9899b85430e8fc30315bdec891071822d701c91c5978096341b7

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\spinbox.tcl

MD5 86bca3ab915c2774425b70420e499140
SHA1 fd4798d79eeba9cffabcb2548068591db531a716
SHA256 51f8a6c772648541684b48622ffe41b77871a185a8acd11e9dec9ec41d65d9cd
SHA512 659fb7e1631ed898e3c11670a04b953eb05cecb42a3c5efbdd1bd97a7f99061920fd5db3915476f224bb2c72358623e1b474b0fc3fbb7fd3734487b87a388fd7

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\combobox.tcl

MD5 fbcaa6a08d9830114248f91e10d4c918
SHA1 fa63c94824bebd3531086816650d3f3fa73fe434
SHA256 9d80aa9701e82862467684d3dff1a9ec5bbc2bbba4f4f070518bbde7e38499bb
SHA512 b377c31cc9137851679cba0560efe4265792d1576bd781dd42c22014a7a8f3d10d9d48a1154bb88a2987197594c8b728b71fa689ce1b32928f8513796a6a0aa3

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\entry.tcl

MD5 f9b29ab14304f18e32821a29233be816
SHA1 6d0253274d777e081fa36cc38e51c2abb9259d0e
SHA256 62d1df52c510a83103badab4f3a77abb1aa3a0e1e21f68ece0cecca2ca2f1341
SHA512 698db665e29b29864f9fe65934cca83a5092d81d5130ffd1eac68c51327ae9ebc007a60a60e1af37063017e448ce84a4024d4a412990a1078287b605df344c70

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\panedwindow.tcl

MD5 a12915fa5caf93e23518e9011200f5a4
SHA1 a61f665a408c10419fb81001578d99b43d048720
SHA256 ce0053d637b580170938cf552b29ae890559b98eb28038c2f0a23a265ddeb273
SHA512 669e1d66f1223cca6ceb120914d5d876bd3cf401ee4a46f35825361076f19c7341695596a7dbb00d6cff4624666fb4e7a2d8e7108c3c56a12bda7b04e99e6f9a

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\notebook.tcl

MD5 82c9dfc512e143dda78f91436937d4dd
SHA1 26abc23c1e0c201a217e3cea7a164171418973b0
SHA256 d1e5267cde3d7be408b4c94220f7e1833c9d452bb9ba3e194e12a5eb2f9adb80
SHA512 a9d3c04ad67e0dc3f1c12f9e21ef28a61fa84dbf710313d4ca656bdf35dfbbfba9c268c018004c1f5614db3a1128025d795bc14b4fffaa5603a5313199798d04

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\progress.tcl

MD5 b0074341a4bda36bcdff3ebcae39eb73
SHA1 d070a01cc5a787249bc6dad184b249c4dd37396a
SHA256 a9c34f595e547ce94ee65e27c415195d2b210653a9ffcfb39559c5e0fa9c06f8
SHA512 af23563602886a648a42b03cc5485d84fcc094ab90b08df5261434631b6c31ce38d83a3a60cc7820890c797f6c778d5b5eff47671ce3ee4710ab14c6110dcc35

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\scale.tcl

MD5 b41a9df31924dea36d69cb62891e8472
SHA1 4c2877fbb210fdbbde52ea8b5617f68ad2df7b93
SHA256 25d0fe2b415292872ef7acdb2dfa12d04c080b7f9b1c61f28c81aa2236180479
SHA512 a50db6da3d40d07610629de45f06a438c6f2846324c3891c54c99074cfb7beed329f27918c8a85badb22c6b64740a2053b891f8e5d129d9b0a1ff103e7137d83

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\scrollbar.tcl

MD5 93181dbe76ef9c39849a09242d6df8c0
SHA1 de3b47afc3e5371bf1cd0541790a9b78a97570ab
SHA256 5932043286a30a3cffb2b6ce68ccdb9172a718f32926e25d3a962ae63cad515c
SHA512 5c85284e063a5de17f6ce432b3ef899d046a78725bd1f930229576bed1116c03a3ee0611b988e9903f47da8f694483e5a76464450c48eb14622f6784004b8f7e

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\menubutton.tcl

MD5 db24841643cebd38d5ffd1d42b42e7f4
SHA1 e394af7faf83fad863c7b13d855fcf3705c4f1c7
SHA256 81b0b7818843e293c55ff541bd95168db51fe760941d32c7cde9a521bb42e956
SHA512 380272d003d5f90c13571952d0c73f5fce2a22330f98f29707f3d5bfc29c99d9bf11a947cf2ca64cf7b8df5e4afe56ffa00f9455bb30d15611fc5c86130346be

C:\Users\Admin\AppData\Local\Temp\onefile_2572_133616343577331508\tk\ttk\button.tcl

MD5 ea7cf40852afd55ffda9db29a0e11322
SHA1 b7b42fac93e250b54eb76d95048ac3132b10e6d8
SHA256 391b6e333d16497c4b538a7bdb5b16ef11359b6e3b508d470c6e3703488e3b4d
SHA512 123d78d6ac34af4833d05814220757dccf2a9af4761fe67a8fe5f67a0d258b3c8d86ed346176ffb936ab3717cfd75b4fab7373f7853d44fa356be6e3a75e51b9

memory/3756-1167-0x00007FFEB31D0000-0x00007FFEB3C91000-memory.dmp

memory/3756-1172-0x00007FFEB31D0000-0x00007FFEB3C91000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Greenwich

MD5 9cd2aef183c064f630dfcf6018551374
SHA1 2a8483df5c2809f1dfe0c595102c474874338379
SHA256 6d9f378883c079f86c0387a5547a92c449869d806e07de10084ab04f0249018d
SHA512 dafa0cb9d0a8e0ff75a19be499751ad85372aafa856ff06dd68ecf2b1c5578bb98a040becaecf0aed2c3e4ff7372ff200fe7614334756d19fe79dd61c01d4e92

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Africa\Banjul

MD5 09a9397080948b96d97819d636775e33
SHA1 5cc9b028b5bd2222200e20091a18868ea62c4f18
SHA256 d2efac4e5f23d88c95d72c1db42807170f52f43dd98a205af5a92a91b9f2d997
SHA512 2eccf2515599ed261e96da3fbcfbab0b6a2dfc86a1d87e3814091709f0bfe2f600c3044c8555ed027978a8ae9045666ee639a8c249f48d665d8e5c60f0597799

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Africa\Djibouti

MD5 86dcc322e421bc8bdd14925e9d61cd6c
SHA1 289d1fb5a419107bc1d23a84a9e06ad3f9ee8403
SHA256 c89b2e253a8926a6cecf7eff34e4bfcdb7fe24daff22d84718c30deec0ea4968
SHA512 d32771be8629fb3186723c8971f06c3803d31389438b29bf6baa958b3f9db9a38971019583ba272c7a8f5eb4a633dfc467bfcb6f76faa8e290bad4fd7366bb2b

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Africa\Kigali

MD5 b77fb20b4917d76b65c3450a7117023c
SHA1 b99f3115100292d9884a22ed9aef9a9c43b31ccd
SHA256 93f19e9551d58868ae5820752d2c93a486124c364463dc9c9489d0458f8bc682
SHA512 a088c2a4c7d72717257c3125c7c2aca28463d68306ea452afaad75b8a0f9e5730a8d9c430d14668809717a672dc63c4816762acb046b339da662da421a6d65df

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Africa\Lagos

MD5 8244c4cc8508425b6612fa24df71e603
SHA1 30ba925b4670235915dddfa1dd824dd9d7295eac
SHA256 cffeb0282ccbd7fba0e493ff8677a1e5a6dd5197885042e437f95a773f844846
SHA512 560c7581dcb2c800eae779005e41406beaf15d24efc763304e3111b9bb6074fe0ba59c48b5a2c5511245551b94418bbc35934d9bd46313fcc6e383323056668c

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\America\Curacao

MD5 adf95d436701b9774205f9315ec6e4a4
SHA1 fcf8be5296496a5dd3a7a97ed331b0bb5c861450
SHA256 8491e557ff801a8306516b8ca5946ff5f2e6821af31477eb47d7d191cc5a6497
SHA512 f8fceff3c346224d693315af1ab12433eb046415200abaa6cdd65fd0ad40673fdddf67b83563d351e4aa520565881a4226fb37d578d3ba88a135e596ebb9b348

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\America\Toronto

MD5 44a2dd3cb61b90aa4201c38e571a15ba
SHA1 73f6ad91b2c748957bdaec149db3b1b6b0d8ac86
SHA256 820392cdb1e499f82ef704d0ccfd0c50ab2b28c6e0bdeb80793861d5e165d5ad
SHA512 11ddb971c65c2f4ecc690ef685163f2972c089660f4778997964d89113a403030927edbb2ed397b81cf61bde9276add6a43ee8ee92dfa69a6d102b035fe9f01d

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Asia\Shanghai

MD5 09dd479d2f22832ce98c27c4db7ab97c
SHA1 79360e38e040eaa15b6e880296c1d1531f537b6f
SHA256 64ffc2e43a94435a043c040d1d3af7e92d031adc78e7737af1861baa4eeef3e6
SHA512 f88ae25f3f04c7d5d5f98aafecc03cc7e4e56f1cd4c8deba6afd043f0fb7fe67b4d50e4df5493e77c6b34ba183e019442e736a13f784ba8c2847c06fd74ff200

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Etc\UCT

MD5 38bb24ba4d742dd6f50c1cba29cd966a
SHA1 d0b8991654116e9395714102c41d858c1454b3bd
SHA256 8b85846791ab2c8a5463c83a5be3c043e2570d7448434d41398969ed47e3e6f2
SHA512 194867d0cf66c2de4969dbfeb58c775964ecb2132acdc1b000b5ef0998cefde4a2979ffc04ec8b7dcb430e43326a79d9cedb28ecea184345aa7d742eaf9234ac

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Europe\Isle_of_Man

MD5 a40006ee580ef0a4b6a7b925fee2e11f
SHA1 1beba7108ea93c7111dabc9d7f4e4bfdea383992
SHA256 c85495070dca42687df6a1c3ee780a27cbcb82f1844750ea6f642833a44d29b4
SHA512 316ecacc34136294ce11dcb6d0f292570ad0515f799fd59fbff5e7121799860b1347d802b6439a291f029573a3715e043009e2c1d5275f38957be9e04f92e62e

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Europe\Oslo

MD5 7db6c3e5031eaf69e6d1e5583ab2e870
SHA1 918341ad71f9d3acd28997326e42d5b00fba41e0
SHA256 5ee475f71a0fc1a32faeb849f8c39c6e7aa66d6d41ec742b97b3a7436b3b0701
SHA512 688eaa6d3001192addaa49d4e15f57aa59f3dd9dc511c063aa2687f36ffd28ffef01d937547926be6477bba8352a8006e8295ee77690be935f76d977c3ea12fe

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Europe\Skopje

MD5 6213fc0a706f93af6ff6a831fecbc095
SHA1 961a2223fd1573ab344930109fbd905336175c5f
SHA256 3a95adb06156044fd2fa662841c0268c2b5af47c1b19000d9d299563d387093a
SHA512 8149de3fd09f8e0f5a388f546ffe8823bdcda662d3e285b5cebc92738f0c6548ccb6ed2a5d086fd738cb3edc8e9e1f81c5e2e48edb0571e7ea7f131675b99327

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Pacific\Wallis

MD5 5bdd7374e21e3df324a5b3d178179715
SHA1 244ed7d52bc39d915e1f860727ecfe3f4b1ae121
SHA256 53268a8a6b11f0b8e02fc67683ae48d074efaf7b4c66e036c1478107afd9a7d7
SHA512 9c76f39e8795c50e6c5b384a7ff1f308a1c5173f42f810759b36cdeae7d33d1dac4934efeed580c59d988c152e2d7f8d9b8eb2073ab1fc15e4b9c10900c7b383

C:\Users\Admin\AppData\Local\Temp\onefile_6496_133616343797133020\pytz\zoneinfo\Pacific\Yap

MD5 ec972f59902432836f93737f75c5116f
SHA1 331542d6faf6ab15ffd364d57fbaa62629b52b94
SHA256 9c1dfa1c15994dd8774e53f40cb14dcf529143468721f1dba7b2c2e14ae9f5f0
SHA512 e8e8c8f6d096c352d1244280254e4c6ecf93f7c2ff69ecc6fa4363a6be8a2daf6cfcd7f0d96bc2669268ced5565532fa06be348a139b0742ccccb83953c6324d

Analysis: behavioral3

Detonation Overview

Submitted

2024-05-31 13:05

Reported

2024-05-31 13:06

Platform

win7-20231129-en

Max time kernel

13s

Max time network

16s

Command Line

"C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe"

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1388 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe C:\Windows\system32\WerFault.exe
PID 1388 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe C:\Windows\system32\WerFault.exe
PID 1388 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe C:\Windows\system32\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 1388 -s 100

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-05-31 13:05

Reported

2024-05-31 13:06

Platform

win10v2004-20240426-en

Max time kernel

40s

Max time network

44s

Command Line

"C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe"

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\module.exe

"C:\Users\Admin\AppData\Local\Temp\sdcheck\module.exe"

C:\Windows\System32\Wbem\wmic.exe

wmic csproduct get uuid

C:\Windows\System32\Wbem\wmic.exe

wmic csproduct get uuid

C:\Windows\System32\Wbem\wmic.exe

wmic csproduct get uuid

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 blood-mlood-app.onrender.com udp
US 216.24.57.4:443 blood-mlood-app.onrender.com tcp
US 216.24.57.4:80 blood-mlood-app.onrender.com tcp
US 216.24.57.4:443 blood-mlood-app.onrender.com tcp
US 8.8.8.8:53 4.57.24.216.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Greenwich

MD5 9cd2aef183c064f630dfcf6018551374
SHA1 2a8483df5c2809f1dfe0c595102c474874338379
SHA256 6d9f378883c079f86c0387a5547a92c449869d806e07de10084ab04f0249018d
SHA512 dafa0cb9d0a8e0ff75a19be499751ad85372aafa856ff06dd68ecf2b1c5578bb98a040becaecf0aed2c3e4ff7372ff200fe7614334756d19fe79dd61c01d4e92

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Africa\Banjul

MD5 09a9397080948b96d97819d636775e33
SHA1 5cc9b028b5bd2222200e20091a18868ea62c4f18
SHA256 d2efac4e5f23d88c95d72c1db42807170f52f43dd98a205af5a92a91b9f2d997
SHA512 2eccf2515599ed261e96da3fbcfbab0b6a2dfc86a1d87e3814091709f0bfe2f600c3044c8555ed027978a8ae9045666ee639a8c249f48d665d8e5c60f0597799

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Africa\Djibouti

MD5 86dcc322e421bc8bdd14925e9d61cd6c
SHA1 289d1fb5a419107bc1d23a84a9e06ad3f9ee8403
SHA256 c89b2e253a8926a6cecf7eff34e4bfcdb7fe24daff22d84718c30deec0ea4968
SHA512 d32771be8629fb3186723c8971f06c3803d31389438b29bf6baa958b3f9db9a38971019583ba272c7a8f5eb4a633dfc467bfcb6f76faa8e290bad4fd7366bb2b

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Africa\Kigali

MD5 b77fb20b4917d76b65c3450a7117023c
SHA1 b99f3115100292d9884a22ed9aef9a9c43b31ccd
SHA256 93f19e9551d58868ae5820752d2c93a486124c364463dc9c9489d0458f8bc682
SHA512 a088c2a4c7d72717257c3125c7c2aca28463d68306ea452afaad75b8a0f9e5730a8d9c430d14668809717a672dc63c4816762acb046b339da662da421a6d65df

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Africa\Lagos

MD5 8244c4cc8508425b6612fa24df71e603
SHA1 30ba925b4670235915dddfa1dd824dd9d7295eac
SHA256 cffeb0282ccbd7fba0e493ff8677a1e5a6dd5197885042e437f95a773f844846
SHA512 560c7581dcb2c800eae779005e41406beaf15d24efc763304e3111b9bb6074fe0ba59c48b5a2c5511245551b94418bbc35934d9bd46313fcc6e383323056668c

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\America\Curacao

MD5 adf95d436701b9774205f9315ec6e4a4
SHA1 fcf8be5296496a5dd3a7a97ed331b0bb5c861450
SHA256 8491e557ff801a8306516b8ca5946ff5f2e6821af31477eb47d7d191cc5a6497
SHA512 f8fceff3c346224d693315af1ab12433eb046415200abaa6cdd65fd0ad40673fdddf67b83563d351e4aa520565881a4226fb37d578d3ba88a135e596ebb9b348

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\America\Toronto

MD5 44a2dd3cb61b90aa4201c38e571a15ba
SHA1 73f6ad91b2c748957bdaec149db3b1b6b0d8ac86
SHA256 820392cdb1e499f82ef704d0ccfd0c50ab2b28c6e0bdeb80793861d5e165d5ad
SHA512 11ddb971c65c2f4ecc690ef685163f2972c089660f4778997964d89113a403030927edbb2ed397b81cf61bde9276add6a43ee8ee92dfa69a6d102b035fe9f01d

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Asia\Shanghai

MD5 09dd479d2f22832ce98c27c4db7ab97c
SHA1 79360e38e040eaa15b6e880296c1d1531f537b6f
SHA256 64ffc2e43a94435a043c040d1d3af7e92d031adc78e7737af1861baa4eeef3e6
SHA512 f88ae25f3f04c7d5d5f98aafecc03cc7e4e56f1cd4c8deba6afd043f0fb7fe67b4d50e4df5493e77c6b34ba183e019442e736a13f784ba8c2847c06fd74ff200

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Etc\UCT

MD5 38bb24ba4d742dd6f50c1cba29cd966a
SHA1 d0b8991654116e9395714102c41d858c1454b3bd
SHA256 8b85846791ab2c8a5463c83a5be3c043e2570d7448434d41398969ed47e3e6f2
SHA512 194867d0cf66c2de4969dbfeb58c775964ecb2132acdc1b000b5ef0998cefde4a2979ffc04ec8b7dcb430e43326a79d9cedb28ecea184345aa7d742eaf9234ac

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Europe\Isle_of_Man

MD5 a40006ee580ef0a4b6a7b925fee2e11f
SHA1 1beba7108ea93c7111dabc9d7f4e4bfdea383992
SHA256 c85495070dca42687df6a1c3ee780a27cbcb82f1844750ea6f642833a44d29b4
SHA512 316ecacc34136294ce11dcb6d0f292570ad0515f799fd59fbff5e7121799860b1347d802b6439a291f029573a3715e043009e2c1d5275f38957be9e04f92e62e

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Europe\Oslo

MD5 7db6c3e5031eaf69e6d1e5583ab2e870
SHA1 918341ad71f9d3acd28997326e42d5b00fba41e0
SHA256 5ee475f71a0fc1a32faeb849f8c39c6e7aa66d6d41ec742b97b3a7436b3b0701
SHA512 688eaa6d3001192addaa49d4e15f57aa59f3dd9dc511c063aa2687f36ffd28ffef01d937547926be6477bba8352a8006e8295ee77690be935f76d977c3ea12fe

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Europe\Skopje

MD5 6213fc0a706f93af6ff6a831fecbc095
SHA1 961a2223fd1573ab344930109fbd905336175c5f
SHA256 3a95adb06156044fd2fa662841c0268c2b5af47c1b19000d9d299563d387093a
SHA512 8149de3fd09f8e0f5a388f546ffe8823bdcda662d3e285b5cebc92738f0c6548ccb6ed2a5d086fd738cb3edc8e9e1f81c5e2e48edb0571e7ea7f131675b99327

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Pacific\Wallis

MD5 5bdd7374e21e3df324a5b3d178179715
SHA1 244ed7d52bc39d915e1f860727ecfe3f4b1ae121
SHA256 53268a8a6b11f0b8e02fc67683ae48d074efaf7b4c66e036c1478107afd9a7d7
SHA512 9c76f39e8795c50e6c5b384a7ff1f308a1c5173f42f810759b36cdeae7d33d1dac4934efeed580c59d988c152e2d7f8d9b8eb2073ab1fc15e4b9c10900c7b383

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\pytz\zoneinfo\Pacific\Yap

MD5 ec972f59902432836f93737f75c5116f
SHA1 331542d6faf6ab15ffd364d57fbaa62629b52b94
SHA256 9c1dfa1c15994dd8774e53f40cb14dcf529143468721f1dba7b2c2e14ae9f5f0
SHA512 e8e8c8f6d096c352d1244280254e4c6ecf93f7c2ff69ecc6fa4363a6be8a2daf6cfcd7f0d96bc2669268ced5565532fa06be348a139b0742ccccb83953c6324d

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\python38.dll

MD5 d2a8a5e7380d5f4716016777818a32c5
SHA1 fb12f31d1d0758fe3e056875461186056121ed0c
SHA256 59ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9
SHA512 ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\vcruntime140.dll

MD5 0e675d4a7a5b7ccd69013386793f68eb
SHA1 6e5821ddd8fea6681bda4448816f39984a33596b
SHA256 bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512 cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ctypes.pyd

MD5 f1e33a8f6f91c2ed93dc5049dd50d7b8
SHA1 23c583dc98aa3f6b8b108db5d90e65d3dd72e9b4
SHA256 9459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4
SHA512 229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\libffi-7.dll

MD5 4424baf6ed5340df85482fa82b857b03
SHA1 181b641bf21c810a486f855864cd4b8967c24c44
SHA256 8c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79
SHA512 8adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd

MD5 d6bae4b430f349ab42553dc738699f0e
SHA1 7e5efc958e189c117eccef39ec16ebf00e7645a9
SHA256 587c4f3092b5f3e34f6b1e927ecc7127b3fe2f7fa84e8a3d0c41828583bd5cef
SHA512 a8f8fed5ea88e8177e291b708e44b763d105907e9f8c9e046c4eebb8684a1778383d1fba6a5fa863ca37c42fd58ed977e9bb3a6b12c5b8d9ab6ef44de75e3d1e

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

MD5 6ae54d103866aad6f58e119d27552131
SHA1 bc53a92a7667fd922ce29e98dfcf5f08f798a3d2
SHA256 63b81af5d3576473c17ac929bea0add5bf8d7ea95c946caf66cbb9ad3f233a88
SHA512 ff23f3196a10892ea22b28ae929330c8b08ab64909937609b7af7bfb1623cd2f02a041fd9fab24e4bc1754276bdafd02d832c2f642c8ecdcb233f639bdf66dd0

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_queue.pyd

MD5 44b72e0ad8d1e1ec3d8722088b48c3c5
SHA1 e0f41bf85978dd8f5abb0112c26322b72c0d7770
SHA256 4aa1bbde1621c49edab4376cf9a13c1aa00a9b0a9905d9640a2694ef92f77d5e
SHA512 05853f93c6d79d8f9c96519ce4c195b9204df1255b01329deaa65e29bd3e988d41454cd305e2199404f587e855737879c330638f2f07bff11388a49e67ba896c

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_lzma.pyd

MD5 37057c92f50391d0751f2c1d7ad25b02
SHA1 a43c6835b11621663fa251da421be58d143d2afb
SHA256 9442dc46829485670a6ac0c02ef83c54b401f1570d1d5d1d85c19c1587487764
SHA512 953dc856ad00c3aec6aeab3afa2deb24211b5b791c184598a2573b444761db2d4d770b8b807ebba00ee18725ff83157ec5fa2e3591a7756eb718eba282491c7c

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\_multiprocessing.pyd

MD5 9b1c3fdf64e5e642cec1a82ac76f8184
SHA1 a104fc78d15a263319ed003517e6929e193455de
SHA256 4aff330cafb4b497cb45a91a2e9e8a64b44f998f582dd795b3df58963d5f76f2
SHA512 173e39901e876cc34b44fbe5ed3f3cab170dc007fcbf93c21cc76b684323d83cc6ef6158587d4ab2d7127e881ff4fd98f92d909f2c4a897c153b69b9ed5804ae

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\cryptography\hazmat\bindings\_rust.pyd

MD5 4b29d509d380e4a3c0bf3c4993f7013a
SHA1 267c1c4500efb03da772d35d132b6971c0b7ea59
SHA256 b1597c2c7e7091604a9e29f4879000ce4631e22b4eacc97c88e44e6f88ce0697
SHA512 4ad43490a5fd1cf7ea09c26f8ff1226e97e0e9480d6717a6ac63bc54ea70e3f19f2a96405c7bcbe956b075aca3894266d9f0ecc26870b8947d4880805fd71a11

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\python3.dll

MD5 7acec875d5672e7aa148b8c40df9aa49
SHA1 96b8cfabe0cfa3df32995919ac77cfdeec26f1f2
SHA256 d96858e433f45917499dbf5e052e56f079ff9ae259fd3caa025c3b1daf852891
SHA512 1208da62fe82b779ec822ad702f9ca4321b34ee590c28e10efe9a2db6d582bfdcae01ab2431c1a98714ef0c60434d64c58f3db31bf5886efbb943adc70d6e975

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\_cffi_backend.pyd

MD5 af96b1d6482552688c6974ad8d4694e1
SHA1 e4e9612ff0cf34d06f71c73b7c31bc89ea6f7b48
SHA256 64b7e32fd6b492f7763d92727a5c23818cc5da3b977b324ca71117aef99dc6c7
SHA512 35ae72614da4cb4eb49851e64a0ef535298c6b96617360f3ce5723832b26f04a1931e48173737b055e7c6fe00f1d788e918489ea5c7775eb9fd0d98216779704

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_bz2.pyd

MD5 3dc8af67e6ee06af9eec52fe985a7633
SHA1 1451b8c598348a0c0e50afc0ec91513c46fe3af6
SHA256 c55821f5fdb0064c796b2c0b03b51971f073140bc210cbe6ed90387db2bed929
SHA512 da16bfbc66c8abc078278d4d3ce1595a54c9ef43ae8837ceb35ae2f4757b930fe55e258827036eba8218315c10af5928e30cb22c60ff69159c8fe76327280087

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\_hashlib.pyd

MD5 a6448bc5e5da21a222de164823add45c
SHA1 6c26eb949d7eb97d19e42559b2e3713d7629f2f9
SHA256 3692fc8e70e6e29910032240080fc8109248ce9a996f0a70d69acf1542fca69a
SHA512 a3833c7e1cf0e4d181ac4de95c5dfa685cf528dc39010bf0ac82864953106213eccff70785021ccb05395b5cf0dcb89404394327cd7e69f820d14dfa6fba8cba

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libcrypto-1_1.dll

MD5 bf83f8ad60cb9db462ce62c73208a30d
SHA1 f1bc7dbc1e5b00426a51878719196d78981674c4
SHA256 012866b68f458ec204b9bce067af8f4a488860774e7e17973c49e583b52b828d
SHA512 ae1bdda1c174ddf4205ab19a25737fe523dca6a9a339030cd8a95674c243d0011121067c007be56def4eaeffc40cbdadfdcbd1e61df3404d6a3921d196dcd81e

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\libssl-1_1.dll

MD5 fe1f3632af98e7b7a2799e3973ba03cf
SHA1 353c7382e2de3ccdd2a4911e9e158e7c78648496
SHA256 1ce7ba99e817c1c2d71bc88a1bdd6fcad82aa5c3e519b91ebd56c96f22e3543b
SHA512 a0123dfe324d3ebf68a44afafca7c6f33d918716f29b063c72c4a8bd2006b81faea6848f4f2423778d57296d7bf4f99a3638fc87b37520f0dcbeefa3a2343de0

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\_ssl.pyd

MD5 8ee827f2fe931163f078acdc97107b64
SHA1 149bb536f3492bc59bd7071a3da7d1f974860641
SHA256 eaeefa6722c45e486f48a67ba18b4abb3ff0c29e5b30c23445c29a4d0b1cd3e4
SHA512 a6d24e72bf620ef695f08f5ffde70ef93f42a3fa60f7c76eb0f521393c595717e05ccb7a61ae216c18fe41e95fb238d82637714cf5208ee8f1dd32ae405b5565

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\unicodedata.pyd

MD5 4c0d43f1a31e76255cb592bb616683e7
SHA1 0a9f3d77a6e064baebacacc780701117f09169ad
SHA256 0f84e9f0d0bf44d10527a9816fcab495e3d797b09e7bbd1e6bd666ceb4b6c1a8
SHA512 b8176a180a441fe402e86f055aa5503356e7f49e984d70ab1060dee4f5f17fcec9c01f75bbff75ce5f4ef212677a6525804be53646cc0d7817b6ed5fd83fd778

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\_cbor2.pyd

MD5 67d5f90acd54ec9cf928feb26bb881b8
SHA1 2e802c001d4a637b642ad7d358843f6917cb0bc8
SHA256 fa019a2edaf6a4210abb8203747d940dcc4c0791e7b215f12c4a212d7e7943db
SHA512 0f3bdf2cea7b86382f068452ec88c1b1f05bef34bba56e9bb2f44524f0f25b7a485a5ff168baa7079883466172265ec71764a4aa0dff40cd613448c46e03362c

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\nacl\_sodium.pyd

MD5 9d1b8bad0e17e63b9d8e441cdc15baee
SHA1 0c5a62135b072d1951a9d6806b9eff7aa9c897a3
SHA256 d733c23c6a4b21625a4ff07f6562ba882bcbdb0f50826269419d8de0574f88cd
SHA512 49e7f6ab825d5047421641ed4618ff6cb2a8d22a8a4ae1bd8f2deefe7987d80c8e0acc72b950d02214f7b41dc4a42df73a7f5742ebc96670d1c5a28c47b97355

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\ed25519_blake2b\_ed25519.pyd

MD5 c586d3af1f4606c57f97e48b1f301ad2
SHA1 11fa7f4edc4b2d814339b505c01852161267bff0
SHA256 442f5f5be6179b9b455744c7a5ec47241ce38f9b5aacf16162eb869c0f3d3176
SHA512 d4a5af11aaa6bfdf98df91a5bbf8523e610f92b40227605600f16f120f88282d2a8f679d0105a6f1a7b68365085c42711be29212e0d5282829b798b2146d1170

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\sr25519\sr25519.pyd

MD5 ea14caab8bfc264a5ab8f1dd28b67c85
SHA1 10f4cd0d20be9d012365d92ac9e0d84870b30458
SHA256 9f364ab45371b8acfe08223f897566dcef193852a9f6618aaf2005ed4882fee0
SHA512 69119035a8aae02705461e7781a3b0a97aee1d334e2799dffaddf8d33556a9131ae79737fa3eb6479dd2d8d38b06c7ec29beda2fd75fa0208464fac7d893a5fb

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\Crypto\Cipher\_raw_cfb.pyd

MD5 0dca79c062f2f800132cf1748a8e147f
SHA1 91f525b8ca0c0db245c4d3fa4073541826e8fb89
SHA256 2a63e504c8aa4d291bbd8108f26eecde3dcd9bfba579ae80b777ff6dfec5e922
SHA512 a820299fba1d0952a00db78b92fb7d68d77c427418388cc67e3a37dc87b1895d9ae416cac32b859d11d21a07a8f4cef3bd26ebb06cc39f04ad5e60f8692c659b

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\Crypto\Util\_strxor.pyd

MD5 5738d83e2a66b6ace4f631a9255f81d9
SHA1 5b6ebb0b82738781732cf7cfd497f5aeb3453de2
SHA256 f2718adadb6e9958081dcb5570ef737c66772c166a6ad8c0401adcd9a70f46a0
SHA512 bb21b62fd7fee22dfa04274d0fa1aec666c7845cd2ec3f01f1a0418a2c68f228ec0ae451c793ccae3aa88f1efee5d6019138c0975497518f990b8511b2fd0e75

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\Crypto\Cipher\_raw_ctr.pyd

MD5 785f15dc9e505ed828356d978009ecce
SHA1 830e683b0e539309ecf0f1ed2c7f73dda2011563
SHA256 b2b68de1d7e5997eb0c8a44c9f2eb958de39b53db8d77a51a84f1d1b197b58b1
SHA512 16033b72be6d66ab3a44b0480eb245d853a100d13a1e820eff5b12ce0bb73e17d6e48b3e778d1b20d0c04fe1fb8a5723c02ed8af434ae64d0944f847796d98f2

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\Crypto\Cipher\_raw_ofb.pyd

MD5 4ed6d4b1b100384d13f25dfa3737fb78
SHA1 852a2f76c853db02e65512af35f5b4b4a2346abd
SHA256 084e4b2da2180ad2a2e96e8804a6f2fc37bce6349eb8a5f6b182116b4d04bd82
SHA512 276201a9bcb9f88f4bbac0cd9e3ea2da83e0fb4854b1a0dd63cff2af08af3883be34af6f06ece32fad2fd4271a0a09a3b576f1ed78b8a227d13c04a07eaf0827

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\Crypto\Cipher\_raw_cbc.pyd

MD5 a1b78a3ce3165e90957880b8724d944f
SHA1 a69f63cc211e671a08daad7a66ed0b05f8736cc7
SHA256 84e071321e378054b6d3b56bbd66699e36554f637a44728b38b96a31199dfa69
SHA512 15847386652cbee378d0ff6aad0a3fe0d0c6c7f1939f764f86c665f3493b4bccaf98d7a29259e94ed197285d9365b9d6e697b010aff3370cf857b8cb4106d7d8

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\Crypto\Cipher\_raw_ecb.pyd

MD5 aec314222600ade3d96b6dc33af380a6
SHA1 c6af3edadb09ea3a56048b57237c0a2dca33bee1
SHA256 ea96505b38d27c085544fb129f2b0e00df5020d323d7853e6a6a8645ac785304
SHA512 bbc00aa7fdf178bb6b2d86419c31967f2bc32d157aa7ee3ac308c28d8bf4823c1fafcde6c91651edc05c146e44d7e59e02a76283890652b27c52f509c3b9ef9a

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\coincurve\libsecp256k1.dll

MD5 ef8e9a716fc919d42c7c3ba98e28c38f
SHA1 e4728979d2ea0b588f9908eb9b9223e3f0369bcc
SHA256 4411df04afe0faa4e6920f4aa929cae99dd05c98911dff99102d227ebab9e195
SHA512 0ccd0ac4834f787b48f4b219e046ab104bcfaaf553fc743b89f2cc111e105639ae942169b5028bc30dfb5b4d521ae7bacba0af16e412d8a30beb094411e8e0f4

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\charset_normalizer\md__mypyc.pyd

MD5 028e8677c6c7293e4cb6c671a4d414d9
SHA1 acc90cd69deb595f8010b5bf0c3d70938cb8057c
SHA256 cdb1201c350dc9f92e25765d550eab45a093772b421bffff5ac0ea8819b67d48
SHA512 f96ba2e24aae719233ef5c55b602f64da5d5f5e8d2540f0866447bfff8ac6a6d93581a2c0164d91ba53d1bceef9dda9adec68f419447ad882863ea725bb4b968

C:\Users\Admin\AppData\Local\Temp\onefile_2904_133616343551437168\charset_normalizer\md.pyd

MD5 367426b02f93916d856dc20504c03a5d
SHA1 abe16956d5b2dd8d47d7434304030113989adf18
SHA256 cf1b152f1542c577bab3d52028a27412c2d275e772a9f0e553546af90fc15766
SHA512 21eb93bd1e656d5560320b67cabb9163c4c592194e9e8bc57d4f182ed92ca487e4870813958ce8f0bc46cd661f55668a0c5bdefa86dc43ec77cd642e14f9e5d6

memory/4476-1741-0x00000000694C0000-0x000000006968F000-memory.dmp