Malware Analysis Report

2024-10-10 08:25

Sample ID 240601-wtdygabc74
Target RatMaker.exe
SHA256 d7d93ae963705be2629de83619b7e27a11321dcbcc2e12b0973a7edc4568eaf4
Tags
blankgrabber evasion execution upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d7d93ae963705be2629de83619b7e27a11321dcbcc2e12b0973a7edc4568eaf4

Threat Level: Known bad

The file RatMaker.exe was found to be: Known bad.

Malicious Activity Summary

blankgrabber evasion execution upx

Blankgrabber family

Deletes Windows Defender Definitions

A stealer written in Python and packaged with Pyinstaller

Command and Scripting Interpreter: PowerShell

Loads dropped DLL

UPX packed file

Drops file in Windows directory

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Enumerates processes with tasklist

Checks SCSI registry key(s)

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-01 18:12

Signatures

A stealer written in Python and packaged with Pyinstaller

Description Indicator Process Target
N/A N/A N/A N/A

Blankgrabber family

blankgrabber

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-01 18:12

Reported

2024-06-01 18:17

Platform

win10-20240404-en

Max time kernel

155s

Max time network

136s

Command Line

"C:\Users\Admin\AppData\Local\Temp\RatMaker.exe"

Signatures

Deletes Windows Defender Definitions

evasion
Description Indicator Process Target
N/A N/A C:\Program Files\Windows Defender\MpCmdRun.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rescache\_merged\4183903823\2290032291.pri C:\Windows\system32\taskmgr.exe N/A
File created C:\Windows\rescache\_merged\1601268389\715946058.pri C:\Windows\system32\taskmgr.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 376 wrote to memory of 4664 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Users\Admin\AppData\Local\Temp\RatMaker.exe
PID 376 wrote to memory of 4664 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Users\Admin\AppData\Local\Temp\RatMaker.exe
PID 4664 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Windows\system32\cmd.exe
PID 4664 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Windows\system32\cmd.exe
PID 4664 wrote to memory of 4596 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Windows\system32\cmd.exe
PID 4664 wrote to memory of 4596 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Windows\system32\cmd.exe
PID 4664 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Windows\system32\cmd.exe
PID 4664 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Windows\system32\cmd.exe
PID 4664 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Windows\system32\cmd.exe
PID 4664 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Windows\system32\cmd.exe
PID 4664 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Windows\system32\cmd.exe
PID 4664 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\RatMaker.exe C:\Windows\system32\cmd.exe
PID 4048 wrote to memory of 3824 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\tasklist.exe
PID 4048 wrote to memory of 3824 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\tasklist.exe
PID 4596 wrote to memory of 2060 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4596 wrote to memory of 2060 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3116 wrote to memory of 2804 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mshta.exe
PID 3116 wrote to memory of 2804 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mshta.exe
PID 2428 wrote to memory of 236 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2428 wrote to memory of 236 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2988 wrote to memory of 2184 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2988 wrote to memory of 2184 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4596 wrote to memory of 4400 N/A C:\Windows\system32\cmd.exe C:\Program Files\Windows Defender\MpCmdRun.exe
PID 4596 wrote to memory of 4400 N/A C:\Windows\system32\cmd.exe C:\Program Files\Windows Defender\MpCmdRun.exe

Processes

C:\Users\Admin\AppData\Local\Temp\RatMaker.exe

"C:\Users\Admin\AppData\Local\Temp\RatMaker.exe"

C:\Users\Admin\AppData\Local\Temp\RatMaker.exe

"C:\Users\Admin\AppData\Local\Temp\RatMaker.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RatMaker.exe'"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Theres an error in your system', 0, 'Error 258', 32+16);close()""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\system32\tasklist.exe

tasklist /FO LIST

C:\Windows\system32\mshta.exe

mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Theres an error in your system', 0, 'Error 258', 32+16);close()"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RatMaker.exe'

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /4

C:\Program Files\Windows Defender\MpCmdRun.exe

"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All

Network

Country Destination Domain Proto
US 8.8.8.8:53 blank-rs0c3.in udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 10.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI3762\ucrtbase.dll

MD5 a6b4fba258d519da313f7be057435ee4
SHA1 0bf414057d0749e9db4da7683eb6d11be174cdd5
SHA256 aa092722797b9a74e9463516e6c63d4d3c904ac263f4a4ea421b0d4d4875f606
SHA512 34f3d006a9bb7835e9d82465874e059a328c8d69abd61c79d6a85a7702df582dabc93126918a0514356fda2810c77acc1d6070ad4418921bd9e8efe34697e4a1

C:\Users\Admin\AppData\Local\Temp\_MEI3762\python311.dll

MD5 bb46b85029b543b70276ad8e4c238799
SHA1 123bdcd9eebcac1ec0fd2764a37e5e5476bb0c1c
SHA256 72c24e1db1ba4df791720a93ca9502d77c3738eebf8b9092a5d82aa8d80121d0
SHA512 5e993617509c1cf434938d6a467eb0494e04580ad242535a04937f7c174d429da70a6e71792fc3de69e103ffc5d9de51d29001a4df528cfffefdaa2cef4eaf31

C:\Users\Admin\AppData\Local\Temp\_MEI3762\VCRUNTIME140.dll

MD5 f12681a472b9dd04a812e16096514974
SHA1 6fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256 d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA512 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

memory/4664-71-0x00007FFC5D980000-0x00007FFC5DF68000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI3762\base_library.zip

MD5 83d235e1f5b0ee5b0282b5ab7244f6c4
SHA1 629a1ce71314d7abbce96674a1ddf9f38c4a5e9c
SHA256 db389a9e14bfac6ee5cce17d41f9637d3ff8b702cc74102db8643e78659670a0
SHA512 77364aff24cfc75ee32e50973b7d589b4a896d634305d965ecbc31a9e0097e270499dbec93126092eb11f3f1ad97692db6ca5927d3d02f3d053336d6267d7e5f

C:\Users\Admin\AppData\Local\Temp\_MEI3762\_ctypes.pyd

MD5 38fb83bd4febed211bd25e19e1cae555
SHA1 4541df6b69d0d52687edb12a878ae2cd44f82db6
SHA256 cd31af70cbcfe81b01a75ebeb2de86079f4cbe767b75c3b5799ef8b9f0392d65
SHA512 f703b231b675c45accb1f05cd34319b5b3b7583d85bf2d54194f9e7c704fbcd82ef2a2cd286e6a50234f02c43616fbeccfd635aefd73424c1834f5dca52c0931

memory/4664-76-0x00007FFC71AC0000-0x00007FFC71AE4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI3762\libffi-8.dll

MD5 90a6b0264a81bb8436419517c9c232fa
SHA1 17b1047158287eb6471416c5df262b50d6fe1aed
SHA256 5c4a0d4910987a38a3cd31eae5f1c909029f7762d1a5faf4a2e2a7e9b1abab79
SHA512 1988dd58d291ee04ebfec89836bb14fcaafb9d1d71a93e57bd06fe592feace96cdde6fcce46ff8747339659a9a44cdd6cf6ac57ff495d0c15375221bf9b1666e

memory/4664-78-0x00007FFC71DA0000-0x00007FFC71DAF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-debug-l1-1-0.dll

MD5 451e40fad4a529da75abccdc9723a9a8
SHA1 e3ef32218a63c91b27ca2a24bc6ea8410677562c
SHA256 c55da85bc6a3c1fca3eab4c0fdb918d35b466b3aa86d2c28233d117bde3d36c5
SHA512 50135031cf10ce011a9595688bbb7b193611d253cc6586e9337321b61de8fef5f9cabb3a217113c6e71013ba40b6f7854640dff8749f4f8a0068be4e85a1908e

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-datetime-l1-1-0.dll

MD5 51a1bef712620a98219f7a1308523665
SHA1 30f6834d7a30af8c13c993f7ca9eda2f9c92a535
SHA256 12ab9012176def0e9ed6c19847a0dbb446b6a2575f534b0f1d9c3e1e2a6fcf72
SHA512 bcb36b2435536a92a4e7c3bd8c929796ddb317c728ca87ae1e641b093fe2f69fd7671b33d8526c165b598c8b79f78367ed93e3f08fcd6b9f9285caf867049dcd

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-console-l1-1-0.dll

MD5 4db53fe4fa460e376722d1ef935c3420
SHA1 b17f050e749ca5b896a1bdafd54c6cd88d02ec5b
SHA256 041d2a89986d9ea14ce9b47083fd641e75bc34ee83b1f9b9e0070d0fa02fb4c6
SHA512 091d49696cfad5aa9e60eda148a09e4c1bfd84713eb56a06bb2c052b28e2e8cafa8d0a61a01d39a49e93444afaa85439f29360c52af7c3a0e3b53db1613c0b8d

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-file-l1-1-0.dll

MD5 1f22501f6bd7ebed5f96cfd0a5390d7f
SHA1 092eca4840f9de5e99f01290cc167cc2c07b0fc7
SHA256 198dd97c0edc412500e890400ea8d2890a6155766b85278e6e7602366d70a479
SHA512 a7a998dc379a0505827e1362eb409f1421dae65987387a78901255f1683f69f56a2d28c077f90eded1c9ed19e4c84564ddabeca284a8cc08275619250a9d5da4

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-fibers-l1-1-0.dll

MD5 49ca161ffc4094bd643adb65a03f6108
SHA1 0bc09cde835fbcf1e1056ad2ddc284f65a3c8b57
SHA256 d04306791507e0284b46b64b69c34ca9c238e270c039caeb0e96cf13b3b2cae2
SHA512 0a94f7c308b02feb72e3323e876702587b7dc56d7f786c3bffef2a6325144c59581a2b48fabc064e73e1d058d6b1f64061bddbd55970a330c7c658a24a81863d

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 95305ac137745d11c5805d162f3da695
SHA1 b80f1683a450834d14455dceffd10048ef0606f4
SHA256 35c5aaf1092e406db5cae36cb5a571b82936bfd333d84ccf672f7d8e72a86387
SHA512 fdbaef161e7d4cf4b905bda7a11a4b9033952d5a94c6bce8322732b16d9dca11634a54f28e1591da88a643fae635fa9c41c4e94bcca83f9ba7cf23730c119c2f

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-file-l2-1-0.dll

MD5 e1d37d21f7875483ae0d187032d5714c
SHA1 51a945a9e6ccf994781a028cd07ab8ee820f542c
SHA256 1076a19f2a42a35c8639fb1ce1666d046e0fd259142f7e645e350211d9d6390f
SHA512 77973d6e5e6ad68b304f50184a95be9d4993338f4f69e07c11275951b2fcfdc02c061182d1a7a394dc18fe77d6d021dd9e8e17cdfbbb8d0c77752c6df1979011

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-memory-l1-1-0.dll

MD5 c3fbc0bd499263dbc6761e7e34ca6e3d
SHA1 c6f6fc8f3d34b73d978090973fac912f5171a8cd
SHA256 ea438ac5926d5eb96999440dc890b24974926230c2a4b788c71ac765bdabd72d
SHA512 656da6d4a9717401ca8e31f5b62352c50a03f9e149cda2268295133c631600f6418758645f0f81fa596ddb3a9927b0759291ae64c9d330026a00b4cc3f6d1ab6

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 1645c51ed436440b51ec2ab21596a953
SHA1 001bef9899617f0b961cc645ed85c30a0606f6bf
SHA256 eb6ead70e58b3d7bd40528a3944ce6389f3140622b1e264e216ee22aefc26689
SHA512 b50a134f1cc52e6395d702ac25e87de490ac4aa07300a785afbc066dfdd1b28acb112003b1725033075fc97d9ed9878bcdb0f3348795821dca2492f625390d8d

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-string-l1-1-0.dll

MD5 5f6e50a3235783de647ccbd5d20f1ce7
SHA1 c5af12af034df61e293f3262fbc31ee24c9df02e
SHA256 e54b9dfdda851d3e1afecdf9f88fc30bffc658a533f5dff362ea915dfa193c58
SHA512 ec9dafbf04606eaf641fb376a12e9e2415c83b7a6a2d348d1f54f8968204cac4b41620da96a6161a651ba782a4204eb7ab9e9540456b45f9445f7e104efbb84c

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-profile-l1-1-0.dll

MD5 bc5385bc13db467fa89b1ac8ba7fb486
SHA1 b44bd2eaa8fb086399125c0349a3e2102fc16154
SHA256 ffd90534607f02b049244fc4acdb8537c4d8a5c87a7d4e3fa0f3b82dad10bb66
SHA512 6653c716e1abd56136bce0252ab928b29c0f316973009c357fb458b414a6e652e4c9e74b0b3ca3c4b534c0186a20f2e4f97a8b1e1bba4883b91b21127c6f1e30

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-synch-l1-2-0.dll

MD5 a5c5e0015b39d058dd3ba707ddb2797d
SHA1 075d66ab5660b22b48129f7bcde7eaf24e6c3e65
SHA256 7eb43d2339d07858f4c95ea648234d44722e86262f1971ef5fa4995a1ca2e642
SHA512 86c0541e82c622a7d8ab74499d1ad56e76f270dc6bcf7d94cae3a7451b94c030bab172ad04b4f7b489d7f0649def9eea2512f8361d94ac4afa0fde3527656020

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-timezone-l1-1-0.dll

MD5 dd86613bbc3da5e41d8bd30803d87c1f
SHA1 35690b9b0fe48f045568e25221694be041f56d4f
SHA256 2312923d7e07c1f58f457ac434b89c01ce675ff42d74bb279326d6c573f675ed
SHA512 6d4a29c99e819368389a9347a719e78125dfbc3166af85425db81f38833b57ba28251472dd42db974876bcf8bc73465d638678b06e3482ceb36c19b943f41ca4

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-convert-l1-1-0.dll

MD5 d8ad7429849045db1da31d30b545c6a0
SHA1 2d13798b365d06c085ea966d84cd3f127d1c7bc8
SHA256 a864aad44892a4735aef3ff76f594715291b74e8ab15fa3857f1d6168d4b7e3a
SHA512 522f7cef3b9bb32814fe35bdef8bf0a816a1db8f427d30039429ce3ba666ddfb8459a777f5dd796bfb816d8f454c5f9aff8cb015b66c87808aa5cd301fc995b0

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-heap-l1-1-0.dll

MD5 fc617cea3a386409177b559099f22557
SHA1 d5291dbcb7a2458b34c8af9d539df4276a1d99ae
SHA256 9f6f171a5c1b0b7947fec31937d8b30789ae4fede08e78f6db2227f0fc22eb73
SHA512 bc3318c0382007895194397c1680cc308916d9ad1450d9e09e8e71f48772dcc890f4189da8c1ac498a75a9e6ac6a0a557f9812394aa4442e195e8039249543c8

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-stdio-l1-1-0.dll

MD5 f00c8e79700909c80a951b900cfae3b7
SHA1 9d41dadb0fba7ea16af40799991225c8f548aeea
SHA256 8a3d1982788c532604dbfa17171d71f8ad85880179e0a3e08c92dcf6536e5ed1
SHA512 033696e294e251cbbf6c8af6774141a1bf51f2056385610d310676e35f1849588f8280128ad090d94015adbc448136ab58486d554ac177e48598065cf64d6c59

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-string-l1-1-0.dll

MD5 3635ebce411c68d4a19345c2770392a2
SHA1 916f6a4991b8478be93036e6301700685bc91234
SHA256 eb137321cbaed6ac69d598d0f7292a742b341597abf8b450ef540856916f7233
SHA512 fec461681a4e827adc2797e09d86a80711fecc95bca64f11519a9af822bd972ff8cd63aea50aa68a3aa23eab4ef5d0c8591f0e8926f802e0cd665607d0659b1e

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-runtime-l1-1-0.dll

MD5 5fc379b333e9d064513fd842ba6b01a4
SHA1 15196ba491dc9b0701b94323017a8ad9a466b6f4
SHA256 d16db9232ec6d06603e049ba8881cd15f1636c2a83c4e91a9f9abd8624b321e4
SHA512 70a2604cb3e9a4d9a167d0080b2ed7081cad6217fa8569223bca720624fea9cec68604712ac24ab301cddc6d71c01b5b1c581f67ac5e43a1826726471344302f

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-process-l1-1-0.dll

MD5 86b8122f87c75cc3dbb3845b16030c64
SHA1 ae65379a9a2312fc7eb58768860b75d0e83b0cc4
SHA256 c4d65f157ffd21f673ee6096952a0576b9d151b803199c3f930b82119c148f62
SHA512 e53a00b8788a865351898f316c307fe18ad2e2dca687b32d7a7f88b816918206e68fb90e4a87eb8cdab76183c975b70398eaba3bad049712eac519bcb2eb14fd

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-time-l1-1-0.dll

MD5 7c33d39026d00829b6471b6553d58585
SHA1 d4540ce9ed17ac5d00fc88bdbfd9db024fc2aa27
SHA256 51c921caa246c20435d4ad5b0785dcb71879aa075ce7c2edf26a13f834e49f35
SHA512 76429a39f3a8e6e47a34bfe3cc1ae2e73386a81c06b851342d09de573c039ca136a78cd5575ac7ffb12ea3454bc33075fb8679e33edd9507bf6ffcefc7aa13e0

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-utility-l1-1-0.dll

MD5 dd274d651970197e27feab08ce4b028d
SHA1 6664642754c808c3f90a07bdac130667640292ff
SHA256 9613e7e0e7abbb4fef8cfb509992382de6b42bf77c13d332f0c63cf607657645
SHA512 2e44a4cc4c270879f1fe2f0196273ce8b5ec501a3be367fccf0d2e314aa92ca5b61b38394970a82f3af1c7507d988b23a4888a572fa26fd5d1a41f6b864b3987

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-math-l1-1-0.dll

MD5 9c6c9fe11c6b86bf31b1828331fbc90e
SHA1 fe18fe7e593e578fadb826df7b8e66aa80848963
SHA256 3308d7121df05de062333b772d91229ae13f626c5aad4255c025cbe5694bc1d8
SHA512 3d84434ce23038b713378a6e02d5f58b5e501bf2b4c3ffdb645a1600f386795b24931ad8dc1edc7dc0b00a69fd99f30567da32cb4c396c3800e29451fda1804c

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-locale-l1-1-0.dll

MD5 1ce8dc500f8d647e45c5277186022b7a
SHA1 ab146c73f9294c7193a2973f2ed3cc9fcf641630
SHA256 396473df7b8645421a1e78358f4e5eefd90c3c64d1472b3bf90765a70847d5eb
SHA512 32b049156e820d8020325123f2e11c123b70573332e494834a2d648f89bca228d94b4ca5acf91dfdfcdd8444be37877c25881c972122dafb19fc43e5c39d1d04

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 712c104617ef0b2adcf6aa3a0117d7df
SHA1 14a158be1051a01637a5320b561bec004f672fe5
SHA256 8289c5306b1dd857e97275611864089986600439cac79babb2466fbc08254cb4
SHA512 62a7a0c5460859880f20ca8a80c5f0cc3f7fcbc00b51d1138e6e44dd988c4fdb5eab59eecc9bf74d1ecaccddb5dc0b35e0be709d8e2599a835aff157ef631ace

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-environment-l1-1-0.dll

MD5 eaf1266b1b58d3228d9c8c6c51e61970
SHA1 28742ae8c761883ae391b72e6f78d65ce9fda5af
SHA256 b1e76699a66f81013ca416fb4d52499b060a00c0d30ff108243a42af2c528ac1
SHA512 5c73dc91be717164f2d519286c8cc46148204b5554bbf7f61e017f95eb1281bd2e906cf00564d1ae2bf68257ef28c069a4434d65c45e0ba5dc649068bdd31cfb

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-crt-conio-l1-1-0.dll

MD5 018f9ce13d833d7830ee2d02239c1161
SHA1 4a544dc22706b999ceeb9477f027068630281075
SHA256 451e761abe2b6031574d02bd7b70a609c62d12757b9c2eebbcd815e66e5f2a4f
SHA512 7574f777508761e64a68cb19a56703987891d94c30622e9599fa132c72e687d55ce7f2822d2d6722132b80dc34dbed995d085573eddca8705cbd989605caa811

C:\Users\Admin\AppData\Local\Temp\_MEI3762\blank.aes

MD5 0c48d3a8d2f332428c882a47ee5e9fd0
SHA1 ac459729a163226e15c5dcdca98d7485af3a121b
SHA256 e62277b596c108452b01d2e13c0afd869d897b070b4f2882eae43c5c9ab0c015
SHA512 e21343c66afb2af1d22bb4b5a49a7ecac520dbe8f785bf8d293291f7d23acab57e4811a344f0e1135cd72ca7c813d8424ffe72ed490fed40f74ae04bb8b21183

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-util-l1-1-0.dll

MD5 5c938aa1d32aada7336717a3bfe2cbad
SHA1 50ab7b54cfeefa470ea8d31d14cb18673c1e97a7
SHA256 edc5f6bb8cd3e74c0b065ebef81f6ea22050c585ffabfac93fa5594b22282b26
SHA512 ec01969aa1b4d62198765b670f1bb59aa42142f9a8ace1302e0fe49a43651ce96953babe44772d49040863f96fdfcc578fff1320f797351077209b9badc100ec

C:\Users\Admin\AppData\Local\Temp\_MEI3762\libcrypto-1_1.dll

MD5 daa2eed9dceafaef826557ff8a754204
SHA1 27d668af7015843104aa5c20ec6bbd30f673e901
SHA256 4dab915333d42f071fe466df5578fd98f38f9e0efa6d9355e9b4445ffa1ca914
SHA512 7044715550b7098277a015219688c7e7a481a60e4d29f5f6558b10c7ac29195c6d5377dc234da57d9def0c217bb3d7feca332a64d632ca105503849f15e057ea

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 72ddeb5483ebf2b74bdf226fd907dfa4
SHA1 dcfabbeab02e3b2a6658afb422c5526b0588dd4e
SHA256 3c86ac8dd9c84d94e205f3a3751521ec88a4653b3f42a9fd8c724adabaacb316
SHA512 507d63174a38d70aecefb8117f21823040fe363949d0f1bf1253934debe7e0e775615efc8ac149022a074bb6e01314dfb62df550e04ea7b6e6241b7891f5717a

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-synch-l1-1-0.dll

MD5 dccb8e4632e84e12fdced9489e8db62f
SHA1 17d50eecc039c225965bcea198f83cca408ba5e0
SHA256 7e7fe561d2733b373cf74cb017a30c753c95ed312d3881bfee33e70ebec3abc1
SHA512 3661593b912d7b9c9b7b65d8465c492091ca036d634882e4db7dd7ea5e3500edde5997c13ba9d1a6d2695b9ae89eec505f304ad9759c0f73bd717fa9969e4a11

C:\Users\Admin\AppData\Local\Temp\_MEI3762\libssl-1_1.dll

MD5 eac369b3fde5c6e8955bd0b8e31d0830
SHA1 4bf77158c18fe3a290e44abd2ac1834675de66b4
SHA256 60771fb23ee37b4414d364e6477490324f142a907308a691f3dd88dc25e38d6c
SHA512 c51f05d26fda5e995fe6763877d4fcdb89cd92ef2d6ee997e49cc1ee7a77146669d26ec00ad76f940ef55adae82921dede42e55f51bd10d1283ecfe7c5009778

C:\Users\Admin\AppData\Local\Temp\_MEI3762\sqlite3.dll

MD5 ddd0dd698865a11b0c5077f6dd44a9d7
SHA1 46cd75111d2654910f776052cc30b5e1fceb5aee
SHA256 a9dd0275131105df5611f31a9e6fbf27fd77d0a35d1a73a9f4941235fbc68bd7
SHA512 b2ee469ea5a6f49bbdd553363baa8ebad2baf13a658d0d0c167fde7b82eb77a417d519420db64f325d0224f133e3c5267df3aa56c11891d740d6742adf84dbe4

C:\Users\Admin\AppData\Local\Temp\_MEI3762\select.pyd

MD5 abf7864db4445bbbd491c8cff0410ae0
SHA1 4b0f3c5c7bf06c81a2c2c5693d37ef49f642a9b7
SHA256 ddeade367bc15ea09d42b2733d88f092da5e880362eabe98d574bc91e03de30e
SHA512 8f55084ee137416e9d61fe7de19e4cff25a4b752494e9b1d6f14089448ef93e15cd820f9457c6ce9268781bd08e3df41c5284801f03742bc5c40b3b81fb798c5

C:\Users\Admin\AppData\Local\Temp\_MEI3762\rarreg.key

MD5 4531984cad7dacf24c086830068c4abe
SHA1 fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA256 58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA512 00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

C:\Users\Admin\AppData\Local\Temp\_MEI3762\rar.exe

MD5 9c223575ae5b9544bc3d69ac6364f75e
SHA1 8a1cb5ee02c742e937febc57609ac312247ba386
SHA256 90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA512 57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

C:\Users\Admin\AppData\Local\Temp\_MEI3762\_decimal.pyd

MD5 7ba541defe3739a888be466c999c9787
SHA1 ad0a4df9523eeeafc1e67b0e4e3d7a6cf9c4dfac
SHA256 f90efa10d90d940cde48aafe02c13a0fc0a1f0be7f3714856b7a1435f5decf29
SHA512 9194a527a17a505d049161935432fa25ba154e1aee6306dee9054071f249c891f0ca7839de3a21d09b57fdc3f29ee7c4f08237b0dfffafa8f0078cfe464bed3b

C:\Users\Admin\AppData\Local\Temp\_MEI3762\_bz2.pyd

MD5 0c13627f114f346604b0e8cbc03baf29
SHA1 bf77611d924df2c80aabcc3f70520d78408587a2
SHA256 df1e666b55aae6ede59ef672d173bd0d64ef3e824a64918e081082b8626a5861
SHA512 c97fa0f0988581eae5194bd6111c1d9c0e5b1411bab47df5aa7c39aad69bfbeca383514d6aaa45439bb46eacf6552d7b7ed08876b5e6864c8507eaa0a72d4334

C:\Users\Admin\AppData\Local\Temp\_MEI3762\_socket.pyd

MD5 4351d7086e5221398b5b78906f4e84ac
SHA1 ba515a14ec1b076a6a3eab900df57f4f37be104d
SHA256 a0fa25eef91825797f01754b7d7cf5106e355cf21322e926632f90af01280abe
SHA512 a1bcf51e797ccae58a0b4cfe83546e5e11f8fc011ca3568578c42e20bd7a367a5e1fa4237fb57aa84936eec635337e457a61a2a4d6eca3e90e6dde18ae808025

C:\Users\Admin\AppData\Local\Temp\_MEI3762\_queue.pyd

MD5 fbbbfbcdcf0a7c1611e27f4b3b71079e
SHA1 56888df9701f9faa86c03168adcd269192887b7b
SHA256 699c1f0f0387511ef543c0df7ef81a13a1cffde4ce4cd43a1baf47a893b99163
SHA512 0a5ba701653ce9755048ae7b0395a15fbb35509bef7c4b4fe7f11dc4934f3bd298bcddbf2a05b61f75f8eb44c4c41b3616f07f9944e0620b031cbe87a7443284

C:\Users\Admin\AppData\Local\Temp\_MEI3762\_lzma.pyd

MD5 8d9e1bb65a192c8446155a723c23d4c5
SHA1 ea02b1bf175b7ef89ba092720b3daa0c11bef0f0
SHA256 1549fe64b710818950aa9bf45d43fe278ce59f3b87b3497d2106ff793efa6cf7
SHA512 4d67306fe8334f772fe9d463cb4f874a8b56d1a4ad3825cff53cae4e22fa3e1adba982f4ea24785312b73d84a52d224dfb4577c1132613aa3ae050a990e4abdf

C:\Users\Admin\AppData\Local\Temp\_MEI3762\_hashlib.pyd

MD5 596df8ada4b8bc4ae2c2e5bbb41a6c2e
SHA1 e814c2e2e874961a18d420c49d34b03c2b87d068
SHA256 54348cfbf95fd818d74014c16343d9134282d2cf238329eec2cda1e2591565ec
SHA512 e16aad5230e4af7437b19c3db373b1a0a0a84576b608b34430cced04ffc652c6fb5d8a1fe1d49ac623d8ae94c8735800c6b0a12c531dcdd012b05b5fd61dff2e

C:\Users\Admin\AppData\Local\Temp\_MEI3762\unicodedata.pyd

MD5 bb3fca6f17c9510b6fb42101fe802e3c
SHA1 cb576f3dbb95dc5420d740fd6d7109ef2da8a99d
SHA256 5e2f1bbfe3743a81b00717011094798929a764f64037bedb7ea3d2ed6548eb87
SHA512 05171c867a5d373d4f6420136b6ac29fa846a85b30085f9d7fabcbb4d902afee00716dd52010ed90e97c18e6cb4e915f13f31a15b2d8507e3a6cfa80e513b6a2

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-processthreads-l1-1-1.dll

MD5 0f99a725b93375f0ba8795e67e5a4fdf
SHA1 9825f0ec9cc4ba99471f4587d4bf97f7083d5f93
SHA256 be77a15dcaf73a7c1be6c62f57e79ef7bbc305e1b7753a4345ba1d88851dba08
SHA512 f95b6472b78f2bea732c6cc4933c83da7cbbf3eec67544b9faf86c6d6183c23e47afadb23e78420ed2dcec7ddde819e0fcb14345614c5acb3d959fca7c5a7468

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-processthreads-l1-1-0.dll

MD5 9d0f94055e51b559e47bc7124e8a9b54
SHA1 47d1fa7c3de9ca19e7dad7adee04ab5fb2dcb33c
SHA256 248e4c840c00327ed84edb13a75f826d0cbd412a288dab6bfa386476589053b3
SHA512 5e53c1ff3c2dde843507e00be0b66521c3d225d3fb405e8d52928706b2711ae189cf7488eb8b9e0fcd5419f93c0710c488e78ba0680ef47268817204a824827d

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 2a183a87968681d137d86be383c3f68c
SHA1 6d70085fc5f07d7f13ccd6591ac3c1179d4a2617
SHA256 5f6905a9b252c955c217a9d3ccfdd390ace9a2b5d0977447efb3a1ec643684db
SHA512 b2691eb6819785c535eab0798ff1442cbd5f485a9a2182c9a97fd6675a076783fb208979b463cb106ba15cdfb60d68dc0a7889aa6eb8bf5bd746015583e68362

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 301c2db0287d25844f0ed8119748f055
SHA1 5eaeff224c0f1dd5e801ea4fe5698233010d38b9
SHA256 44aeff16fcc3fa571e490b277c98dfa6352bc633de1ced8ab454a629655a8295
SHA512 3abb2fdddde2d08f38a0e22d3d61dfbf0990d7834ce80a55fb5c6fa68ae523bafab8ee7067c087a802f52fe8f506fe04d6b5b77d3b584cd519741524453c6f81

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-localization-l1-2-0.dll

MD5 09fed91680050e3149c29cf068bc10e5
SHA1 e9933b81c1d7b717f230ea98bb6bafbc1761ec4a
SHA256 3c5900c9e7fbada56e86d8973a582771dde6bff79ca80ae05920a33a2cc435df
SHA512 e514590385561731f2ad18afd6bcefac012ea8061a40b6ccfda4e45ff5768617b2e1b06e849e8a640a10ca59039e89ba88cac5d3b7ff088968eb4bc78e212d3a

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 cc56472bc6e4f1326a5128879ffe13cc
SHA1 636a4b3a13f1afff9e4eda1d2e6458e2b99221a7
SHA256 b4cf594dabb6c5255755a0b26a2ff5a2ac471818580f340f0432dbb758b34185
SHA512 baa0a6d83245f438548e2c546f89d2fb367d3492bec526324a9efb96accfa67602bc401211fc4574cb71377aaebee2ee9b13b562fcd3cf56fc983ae7faa12613

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-interlocked-l1-1-0.dll

MD5 2a3d1be9d329d76a89679f8cb461429f
SHA1 37716d8bdb2cfa84bedaad804979874ef50b6330
SHA256 21c91b58166c8066d5c85c97da82b496b45fa9ed3a1d6b76db85aa695a7cd772
SHA512 46230a42e282534fa4898bfc4271e5098856e446c505475e5226a4e5d95685ddc5fc029c20ba7129cb76ac5fb05ea0a449a092a4b546a00c060db0efb737958f

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-heap-l1-1-0.dll

MD5 51de1d1929921f8465fb92e884d675e0
SHA1 977e991fcf396f606ec06260d52e2d6ab39287cc
SHA256 ad09fbff3441c744c6a3c0acec7b0269f764ea7da6aa467911e812f042c6af15
SHA512 6c2efb80d1863e6a991fcd385f3276ec4f20215a99c1ce73947adc15c073d58405faebc229f29c4befba544438b8a9f38e5e2816ab708e3cfeee0d08327237d1

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-handle-l1-1-0.dll

MD5 d0f562394866e238d2df761bc4cce7be
SHA1 613c83d4efbc8306d2f776535fd60660e7f3b457
SHA256 6af859139a2873c8c7b681174ef620b13f71f3e879b39edaee66b20ae018ae4f
SHA512 7a2be6fe33b1fee83ec4072fe9e8ab36545d64fe2211a957d47516d8e71f9ddc6dc13b1aa3db0a3d9cb34c0eab023149a427172999c069b91cad4753eca42085

C:\Users\Admin\AppData\Local\Temp\_MEI3762\api-ms-win-core-file-l1-2-0.dll

MD5 b38d5b15f77e6cd93763c76ff1bc79ee
SHA1 cadffe8a06835a7c1aa136a5515302d80d8e7419
SHA256 aa9e41933f1cf1c3bcc3b65771297b0ef088fac153c7997c0d48e7882714d05f
SHA512 46eaeb419654efd999146b9cd55ece42939e071f089ccb4698a09f4bb6b881106a3e342901439f867f609c1147ef151832b2919d2a33726643a6e5c4086a5f3a

memory/4664-136-0x00007FFC717C0000-0x00007FFC717ED000-memory.dmp

memory/4664-137-0x00007FFC717A0000-0x00007FFC717B9000-memory.dmp

memory/4664-138-0x00007FFC71770000-0x00007FFC71793000-memory.dmp

memory/4664-139-0x00007FFC6D9B0000-0x00007FFC6DB23000-memory.dmp

memory/4664-140-0x00007FFC6E600000-0x00007FFC6E619000-memory.dmp

memory/4664-141-0x00007FFC71760000-0x00007FFC7176D000-memory.dmp

memory/4664-142-0x00007FFC6E5D0000-0x00007FFC6E5FE000-memory.dmp

memory/4664-143-0x00007FFC5D980000-0x00007FFC5DF68000-memory.dmp

memory/4664-144-0x00007FFC6D8F0000-0x00007FFC6D9A8000-memory.dmp

memory/4664-146-0x00007FFC71AC0000-0x00007FFC71AE4000-memory.dmp

memory/4664-145-0x00000175E0B80000-0x00000175E0EF5000-memory.dmp

memory/4664-147-0x00007FFC61A20000-0x00007FFC61D95000-memory.dmp

memory/4664-148-0x00007FFC6E5B0000-0x00007FFC6E5C4000-memory.dmp

memory/4664-152-0x00007FFC6D770000-0x00007FFC6D88C000-memory.dmp

memory/4664-151-0x00007FFC717A0000-0x00007FFC717B9000-memory.dmp

memory/4664-150-0x00007FFC6E5A0000-0x00007FFC6E5AD000-memory.dmp

memory/4664-149-0x00007FFC717C0000-0x00007FFC717ED000-memory.dmp

memory/2060-162-0x0000025F79330000-0x0000025F79352000-memory.dmp

memory/236-166-0x0000020FAC150000-0x0000020FAC1C6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rqyxnimc.pnj.ps1

MD5 c4ca4238a0b923820dcc509a6f75849b
SHA1 356a192b7913b04c54574d18c28d46e6395428ab
SHA256 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA512 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

memory/4664-207-0x00007FFC6E5A0000-0x00007FFC6E5AD000-memory.dmp

memory/4664-208-0x00007FFC6D770000-0x00007FFC6D88C000-memory.dmp

memory/4664-225-0x00007FFC5D980000-0x00007FFC5DF68000-memory.dmp

memory/4664-205-0x00007FFC61A20000-0x00007FFC61D95000-memory.dmp

memory/4664-206-0x00007FFC6E5B0000-0x00007FFC6E5C4000-memory.dmp

memory/4664-203-0x00007FFC6E5D0000-0x00007FFC6E5FE000-memory.dmp

memory/4664-202-0x00007FFC71760000-0x00007FFC7176D000-memory.dmp

memory/4664-201-0x00007FFC6E600000-0x00007FFC6E619000-memory.dmp

memory/4664-199-0x00007FFC71770000-0x00007FFC71793000-memory.dmp

memory/4664-198-0x00007FFC717A0000-0x00007FFC717B9000-memory.dmp

memory/4664-197-0x00007FFC717C0000-0x00007FFC717ED000-memory.dmp

memory/4664-196-0x00007FFC71DA0000-0x00007FFC71DAF000-memory.dmp

memory/4664-195-0x00007FFC71AC0000-0x00007FFC71AE4000-memory.dmp

memory/4664-204-0x00007FFC6D8F0000-0x00007FFC6D9A8000-memory.dmp

memory/4664-200-0x00007FFC6D9B0000-0x00007FFC6DB23000-memory.dmp