Malware Analysis Report

2024-11-30 13:15

Sample ID 240620-1xvslsygpc
Target 184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958
SHA256 184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958
Tags
pyinstaller execution persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958

Threat Level: Likely malicious

The file 184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958 was found to be: Likely malicious.

Malicious Activity Summary

pyinstaller execution persistence

Command and Scripting Interpreter: PowerShell

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Drops file in System32 directory

Unsigned PE

Detects Pyinstaller

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

Scheduled Task/Job: Scheduled Task

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-20 22:02

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-20 22:02

Reported

2024-06-20 22:04

Platform

win10v2004-20240508-en

Max time kernel

94s

Max time network

100s

Command Line

"C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe"

Signatures

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe

"C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe"

C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe

"C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "powershell -Command "Add-MpPreference -ExclusionPath 'C:'""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath 'C:'"

Network

Country Destination Domain Proto
US 8.8.8.8:53 github.com udp
NL 52.111.243.29:443 tcp
US 8.8.8.8:53 github.com udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI36842\ucrtbase.dll

MD5 3b337c2d41069b0a1e43e30f891c3813
SHA1 ebee2827b5cb153cbbb51c9718da1549fa80fc5c
SHA256 c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7
SHA512 fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499

C:\Users\Admin\AppData\Local\Temp\_MEI36842\python312.dll

MD5 3c388ce47c0d9117d2a50b3fa5ac981d
SHA1 038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256 c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512 e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35

C:\Users\Admin\AppData\Local\Temp\_MEI36842\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

C:\Users\Admin\AppData\Local\Temp\_MEI36842\base_library.zip

MD5 9f57ec99436720eadbfeae4f392b0ddb
SHA1 30370729867e79b8c3c566970999ac3f0b5b17b3
SHA256 f83623543f35d7e6c875b28bc64db2a2036b11de1301cb807eed0dcb02d8fd7e
SHA512 4b9c72698c8daf2292cb052edc3ec7edfd5d6bf616684beeff9b81b61e0045d8abba79c7ec631b1adcc7ac1c453384bff6cddea39b96736e8e8cc075c544502d

C:\Users\Admin\AppData\Local\Temp\_MEI36842\python3.DLL

MD5 79b02450d6ca4852165036c8d4eaed1f
SHA1 ce9ff1b302426d4c94a2d3ea81531d3cb9e583e4
SHA256 d2e348e615a5d3b08b0bac29b91f79b32f0c1d0be48976450042462466b51123
SHA512 47044d18db3a4dd58a93b43034f4fafa66821d157dcfefb85fca2122795f4591dc69a82eb2e0ebd9183075184368850e4caf9c9fea0cfe6f766c73a60ffdf416

C:\Users\Admin\AppData\Local\Temp\_MEI36842\libffi-8.dll

MD5 0f8e4992ca92baaf54cc0b43aaccce21
SHA1 c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256 eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA512 6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

C:\Users\Admin\AppData\Local\Temp\_MEI36842\_socket.pyd

MD5 dc06f8d5508be059eae9e29d5ba7e9ec
SHA1 d666c88979075d3b0c6fd3be7c595e83e0cb4e82
SHA256 7daff6aa3851a913ed97995702a5dfb8a27cb7cf00fb496597be777228d7564a
SHA512 57eb36bc1e9be20c85c34b0a535b2349cb13405d60e752016e23603c4648939f1150e4dbebc01ec7b43eb1a6947c182ccb8a806e7e72167ad2e9d98d1fd94ab3

C:\Users\Admin\AppData\Local\Temp\_MEI36842\_queue.pyd

MD5 6e0cb85dc94e351474d7625f63e49b22
SHA1 66737402f76862eb2278e822b94e0d12dcb063c5
SHA256 3f57f29abd86d4dc8f4ca6c3f190ebb57d429143d98f0636ff5117e08ed81f9b
SHA512 1984b2fc7f9bbdf5ba66716fc60dcfd237f38e2680f2fc61f141ff7e865c0dbdd7cdc47b3bc490b426c6cfe9f3f9e340963abf428ea79eb794b0be7d13001f6a

C:\Users\Admin\AppData\Local\Temp\_MEI36842\_lzma.pyd

MD5 05e8b2c429aff98b3ae6adc842fb56a3
SHA1 834ddbced68db4fe17c283ab63b2faa2e4163824
SHA256 a6e2a5bb7a33ad9054f178786a031a46ea560faeef1fb96259331500aae9154c
SHA512 badeb99795b89bc7c1f0c36becc7a0b2ce99ecfd6f6bb493bda24b8e57e6712e23f4c509c96a28bc05200910beddc9f1536416bbc922331cae698e813cbb50b3

C:\Users\Admin\AppData\Local\Temp\_MEI36842\_hashlib.pyd

MD5 eedb6d834d96a3dffffb1f65b5f7e5be
SHA1 ed6735cfdd0d1ec21c7568a9923eb377e54b308d
SHA256 79c4cde23397b9a35b54a3c2298b3c7a844454f4387cb0693f15e4facd227dd2
SHA512 527bd7bb2f4031416762595f4ce24cbc6254a50eaf2cc160b930950c4f2b3f5e245a486972148c535f8cd80c78ec6fa8c9a062085d60db8f23d4b21e8ae4c0ad

C:\Users\Admin\AppData\Local\Temp\_MEI36842\_decimal.pyd

MD5 3055edf761508190b576e9bf904003aa
SHA1 f0dc8d882b5cd7955cc6dfc8f9834f70a83c7890
SHA256 e4104e47399d3f635a14d649f61250e9fd37f7e65c81ffe11f099923f8532577
SHA512 87538fe20bd2c1150a8fefd0478ffd32e2a9c59d22290464bf5dfb917f6ac7ec874f8b1c70d643a4dc3dd32cbe17e7ea40c0be3ea9dd07039d94ab316f752248

C:\Users\Admin\AppData\Local\Temp\_MEI36842\_cffi_backend.cp312-win_amd64.pyd

MD5 0572b13646141d0b1a5718e35549577c
SHA1 eeb40363c1f456c1c612d3c7e4923210eae4cdf7
SHA256 d8a76d1e31bbd62a482dea9115fc1a109cb39af4cf6d1323409175f3c93113a7
SHA512 67c28432ca8b389acc26e47eb8c4977fddd4af9214819f89df07fecbc8ed750d5f35807a1b195508dd1d77e2a7a9d7265049dcfbfe7665a7fd1ba45da1e4e842

C:\Users\Admin\AppData\Local\Temp\_MEI36842\_bz2.pyd

MD5 223fd6748cae86e8c2d5618085c768ac
SHA1 dcb589f2265728fe97156814cbe6ff3303cd05d3
SHA256 f81dc49eac5ecc528e628175add2ff6bda695a93ea76671d7187155aa6326abb
SHA512 9c22c178417b82e68f71e5b7fe7c0c0a77184ee12bd0dc049373eace7fa66c89458164d124a9167ae760ff9d384b78ca91001e5c151a51ad80c824066b8ecce6

C:\Users\Admin\AppData\Local\Temp\_MEI36842\unicodedata.pyd

MD5 16be9a6f941f1a2cb6b5fca766309b2c
SHA1 17b23ae0e6a11d5b8159c748073e36a936f3316a
SHA256 10ffd5207eeff5a836b330b237d766365d746c30e01abf0fd01f78548d1f1b04
SHA512 64b7ecc58ae7cf128f03a0d5d5428aaa0d4ad4ae7e7d19be0ea819bbbf99503836bfe4946df8ee3ab8a92331fdd002ab9a9de5146af3e86fef789ce46810796b

C:\Users\Admin\AppData\Local\Temp\_MEI36842\select.pyd

MD5 92b440ca45447ec33e884752e4c65b07
SHA1 5477e21bb511cc33c988140521a4f8c11a427bcc
SHA256 680df34fb908c49410ac5f68a8c05d92858acd111e62d1194d15bdce520bd6c3
SHA512 40e60e1d1445592c5e8eb352a4052db28b1739a29e16b884b0ba15917b058e66196988214ce473ba158704837b101a13195d5e48cb1dc2f07262dfecfe8d8191

C:\Users\Admin\AppData\Local\Temp\_MEI36842\libssl-3.dll

MD5 19a2aba25456181d5fb572d88ac0e73e
SHA1 656ca8cdfc9c3a6379536e2027e93408851483db
SHA256 2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512 df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

C:\Users\Admin\AppData\Local\Temp\_MEI36842\libcrypto-3.dll

MD5 e547cf6d296a88f5b1c352c116df7c0c
SHA1 cafa14e0367f7c13ad140fd556f10f320a039783
SHA256 05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA512 9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-utility-l1-1-0.dll

MD5 4653da8959b7fe33d32e61e472507d54
SHA1 6d071b52f40dc609f40989b3dd0fb53124607df8
SHA256 b7e186a946119791e42f17e623732e23f864f98b592c41d95b3da0532ea9d5f3
SHA512 81e17cf4b64ed5efba191d35b1877384544557c3001efa0321a755a35413740ae66e39e39f573d3184ef8c893c739a74d37f170fe540f81177a83b44bc18ba6d

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-time-l1-1-0.dll

MD5 9bc895e2cc140e168fa55372fce8682b
SHA1 579d71e19331625dda84baa9d8b81dd3bafc9913
SHA256 287f80b2b330cc5f9fdf47de50b189993ce925b5e2b7a6da5cdaef9c7d5f36c1
SHA512 de0e5c6f9656106fcf2443d863d26c4b16bbb5b40e676199f9c459be02b4837a2d32bddda82543eb2e0bf14a27edea7f5d506914da8d63da77ed7ccd2204aa65

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-string-l1-1-0.dll

MD5 2e657fe299572eacdac67f4b9f603857
SHA1 eb4fbc0147d4df5d4ef81953bc1265d505a19297
SHA256 ec3c2bff10b9469ac9c6ed109307731a1a4694fb54856ddd082a2ffd3cc34df2
SHA512 ee3899584ecece342accbd73d681358cfe8b4fd2ed07cf3034b14f3d04e3b03e5d6d041a0afcb0b2b2b5afac118032317b5eca00d11f7703d9d0dae0e3ac38f7

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-stdio-l1-1-0.dll

MD5 4a3342bce6b58ef810e804f1c5915e40
SHA1 fe636cca0a57e92bb27e0f76075110981d3b3639
SHA256 2509179079a598b3e5dfd856d8e03e45de7379c628901dbd869ec4332ddb618c
SHA512 f0c626f88f016c17fa45ea62441dd862a9575666ec06734f61d8e153c5f46a016fe1d9271293a8e29afbd167f7a381e3ee04cb413736bc224ac31e0fe760341c

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-runtime-l1-1-0.dll

MD5 dc8bfceec3d20100f29fd4798415dc00
SHA1 bd4764be2833f40c1cc54229c759f83d67ae5294
SHA256 4950d0a97cb18971355247feccfd6f8ea24e46bca30f54540c050e4631ec57a8
SHA512 cc7899ad716a81af46d73b1cb8ded51aee9619f2accc35859e351fb8ee4f965f5bcc9adbb7353ca7a3c8e39d36c09481f66519cb173da1d2578718c764fb6fae

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-process-l1-1-0.dll

MD5 38d1c8d2aa2023d85aca69286d79fb78
SHA1 a97e806268dc4ee781ec2bfb654ed8bf91c2a83a
SHA256 381a09a63b5818a2499144adbd8c5f6bbcfce93d643e9920cc54485006fbcc48
SHA512 fc71441009ebe69dfbc04a791cb401306cb88f7bed5290cd899e234d290209917dc7fbd0d0d1a16ceb056858c77306b8ee5f3c17432f3594904b73b20162738e

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-math-l1-1-0.dll

MD5 a12569b252b6761a6330d2ffb6c2983b
SHA1 cc6bdb88b252144af816976a181d2b3b961ce389
SHA256 ab0de0cf89f88b947e01a5ab630d71384ad69f903cef063ccb10de54d061ea2e
SHA512 ee9cb0e2c613374348a34e4a65c83da8d35e6e841f50eed726ff397c7bb6ec430ed200b3b1a541041a91ebe5ae0c96270ee7b891c8c173b340c82abd2cdf8750

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-locale-l1-1-0.dll

MD5 78fc4a7e489f64ea5e0a745c12477fd8
SHA1 51ab73b5142ee2f742abdaedf427690613a19f4a
SHA256 c12c28e3391a8c8adcabe4632470de824118c56338f46fcd8b99257709f50604
SHA512 c9064ff0b39421b28720e65e70695a997995cbec80f1534d88b886bda1797a7316d9b61e458b894b528c7bce21c36f1d4acd916de96d0cdfde59107ea93cd5d7

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-heap-l1-1-0.dll

MD5 481282554b34e19c77978dc7888434e6
SHA1 bd33f1189fc79ac57716f9d030ef0bdd30205115
SHA256 8895c5ab2152a7f25f0c44a3457867229046952106d422331a1c57ad7935b47e
SHA512 fbe98fda91618dd980709babd8e56b8c4c4ff370e6de23075f89303aafffd723dddfd270f388c573914385e957add756bfe2b1fcef5f9f86cb30e111177a52e9

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 1fd59e1dd71eb3bdadb313029710dc33
SHA1 82f5de117d9c55247da873ab8ad23f4e07841366
SHA256 953e4403094ec0c3e8c3a9ab38012cc36d86ac5fe3fff2d6b6c5f51f75737c46
SHA512 69608ff0127587b93db86c8cb27a932fa4b550c7d8d908f9fb8579ba2bccc6d43e7283363f7b46dd39a40a8c790a030028a78302703658fd5d68f5ee9452a5aa

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-environment-l1-1-0.dll

MD5 4eeb879fceeae59927f98a1a199b59ca
SHA1 3bb833edf4c10b42b7b376b93644ccc7f9a4b0f8
SHA256 e1b95e27cad9da4f0bd8bf4c913f49b9b8da6d28303f2946b55da3bd7feb36a3
SHA512 6a43eb0c660395a60d17401e948bc4da010261197ea13b5c9e043e7ee93c30eb17efb9b6b138ecdd77ddc3d0caa98921b57bfc244f6cd554417a0fba5c9407b0

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-convert-l1-1-0.dll

MD5 55e742035343af7b93caeeb71d322bed
SHA1 121134dfeca618ec3fae3fb640e541141d0c7b65
SHA256 2364fa428deba813b8a27b369acea8ed365aa5c9da776d57e146576920746f0e
SHA512 601474b8c9185cb734df191f4382590f1466c0a32773e17c73afa5c1446dc648253d44e4ebad6ce0d29288afb1d7794c09ff0d7cfe81a3adc3dc26b3da46103d

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-crt-conio-l1-1-0.dll

MD5 43760078912b411595bcded3b2eb063d
SHA1 bd00cd60fd094b87ab0cff30cd2afe0a78853f22
SHA256 0a9bcaa55326373200396bb1af46b3058f8f7af7be3289544dddbafdec420fea
SHA512 d779f67bbb6e9867bcef7667c28e0032c01f36b8ea418504e9683240a6c0d9640b24d1dc5fa78cc9dcc4515f7be0d314f27ebcebc047b2e0f71680905d87827b

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-util-l1-1-0.dll

MD5 85a8b925d50105db8250fa0878bb146e
SHA1 4b56d7eb81e0666e0cd047f9205584a97ce91a01
SHA256 f3324803591d2794bad583c71d5036976941631a5f0e6d67c71fc8ba29f30ba8
SHA512 cb074508052fafa8baa2e988e0f4241411a543e55a6a9fee915029c6aa87c93cce1f0b14fe0658361b6b4ab6880b31a950c215404c0d71d8a862d4e74ab3b797

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-timezone-l1-1-0.dll

MD5 953c63ef10ec30ef7c89a6f0f7074041
SHA1 4b4f1ff3085fded9dbd737f273585ad43175b0a3
SHA256 c93954167c12e15b58ac95240d2e0a2fbd94561d739d9f6aca906d9c30453496
SHA512 b4534785e4d02ad387e3c6082884d438cc4b3cd8758aabcf99620052f5842dbd298351bc1723c274d4f7d3fce0cc940df3d47865fece2f07cdb1151376ba852e

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 1f0ab051a3f210db40a8c5e813ba0428
SHA1 e2ec19439618df1d6f34ee7c76108e3ea90a8b14
SHA256 2d4cdda6d6aec0b1a84d84528380c5650683b8eed680f3cafd821ac7f422070c
SHA512 a8ba535580d6756ac30e725411980a8d17e9a8aa1229233bb7a9b15c55b18b61136772d5d75cce0edf21b0f300bbd4d2458a4c69762261e928ef3cb7d5a14bdd

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-synch-l1-2-0.dll

MD5 b865442fb6836a9b933a216109ff3d0f
SHA1 15011fcaea649ca016fa93996639f59c23b74106
SHA256 498194cfe8b1138385595a7db3863adf29a9663551d746fb64648ffd075186b3
SHA512 eeb9fa00a941c4b30320fbb9ecc2717e53d13cd12394500d795be742dbe25c5fdf8590e9fe7f3b210a9d9aa07c7392419823a6a947591e7a38707a87309a2b76

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-synch-l1-1-0.dll

MD5 2c4be18e4d56e056b3fb7c2afb032e9e
SHA1 9620c91a98175dddccc1f1af78393143249e9eb9
SHA256 56657da3db3877624f5dad3980df3235fe7e1038916627c0845b5001199d513f
SHA512 18cbb5671ed99b475c7f6ff2d41943ba6d28fbbd781884bf069d1aa83f051c00d61baa11459dcca4fe2a4bc26c3540e1f598e4e0ae59a5e18d340a68b695ed78

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-string-l1-1-0.dll

MD5 9ab1bde57b958090d53de161469e5e8d
SHA1 8452aed000b2e77040ba8b1e5762532cdf5a60ad
SHA256 199c988d566f19e8c67f4cd7147a7df591cd2f2d648cbc511a5e4580346e75f4
SHA512 cf53c6885e154a05f8773d6b66a605049d70cc544f22a11d423c885608cd387446306ce6dfee2cc4ee9387cdc0a50da55948b5e55ad94acde7c7fd04fe38a137

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 c03daa9e875ff8638f631b1c95f4b342
SHA1 71eaeaccea8a302f87d1594ce612449c1195e882
SHA256 a281ae7a487ecea619e696903e5a8119ae3f9e9eb2f0b64b31a8324b530a4d35
SHA512 efa6ca2710f9827888f2cfcb87a321d66593b39988ebf743f37e2b8fe77dba9517bdd8571d0be7573cd6e1c786c1edba10857cfb6060e315aa0d46a16523d43b

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-profile-l1-1-0.dll

MD5 430d7cdd96bc499ba9eb84bb36aa301a
SHA1 48b43f6e4ffa8423966d06b417b82c5f72525dd9
SHA256 3e16b030a162ee3b4f6bf612af75d02a768a87f2d6a41a83f5adab2ec3c24dd1
SHA512 51042ebca24086e1d0015fa921816a2f3c56065e1e15190b48c58656eb88610d64acacb87584981963cab501985c2cb68e53075cf5e0c65761bbddaf56fbbab0

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-processthreads-l1-1-1.dll

MD5 b1ba47d8389c40c2dda3c56cbed14fc5
SHA1 2eef9ffa32171d53affa44e3db7727aa383f7fac
SHA256 c7277c05dc6b905fad5cb930b0ecfbbc4676b46974b4571e54ca44cb6f6be404
SHA512 466e31f17f73bda5149343b23f4966502a8597d2a2e43f9a6c9c32387451d92c6b658ccaae27044e68e4a9fd0ef9c89e32dc7639d59fcf04c596b6abfa09658b

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-processthreads-l1-1-0.dll

MD5 d21be88a58960edfe83ccbbdf5c4103d
SHA1 3cb0d010837b77102e77ca62e1033ef4eb5473ac
SHA256 3e909b4951e485de391f9a101e513b32c6d3507674c4d666ad3105b939b25c24
SHA512 99b1fda3ec9292a59ed528ab243b4f8ac63e2d7b219135f26050bb7dd124a5d5dc4a14a69383a8aa0b03f0f0a3bccf0c233ef09b8e3d3bdf43d0aa1cfc1a3992

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 df64597430e1126c3ba0fe5ecf995004
SHA1 3e32ad558501fb9d108f885a55841605be641628
SHA256 9638950211cbdcdaeb886cab277573391bf7dda2fbdb24fc18d31125dc8a7c24
SHA512 e16c1f5468bf2fc90b66b4b66dbad62cdbe29180f8da8ab8ad28d1b0c418cb96eadf24bb54f2ee9bcfe3176256d05f7eb591b6f908e47bd420ba22768fe0ea61

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 94fce2f4b244d3968b75a4a61b2347ab
SHA1 c5898af5fd941c19fcdd949c6b4e2bb090d040d2
SHA256 c513bdc265654d2e9a304423f299fb46953631f0d78af8c1d397cd58b491475a
SHA512 1afe1f3a9b803c5758ff24376fe040d856b5ca814717b490464260c9c78e70ce6c166efbcc98e26ac12dd6173285b4863da7df4ff644d1d8150f8ac4b47113e1

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-memory-l1-1-0.dll

MD5 5e93bf4aa81616285858ca455343b6d3
SHA1 8de55be56b6520801177f757d9e3235ec88085f7
SHA256 c44ec29a51145281372007d241a2cc15b00d0bacc8adfaac61e8e82efe8ea6a3
SHA512 e6a46dad1d7125dbaaf9d020100d7ec321620e38fdd1c931af74e8ec25e841c52555ec9646a895ad4450de94f70e82e9a237c2895ddfd16769b07cb73ad827e0

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-localization-l1-2-0.dll

MD5 0414909b279ea61ca344edbe8e33e40b
SHA1 4ece0dabe954c43f9bd5032de76ec29c47b22e10
SHA256 05b0c773a77850f3d50ddb4b82cc4d5f19316fe1aaa65e21b4709ae73f60a28e
SHA512 edbd33540cd1ef69f2ce824cfb991903ec6e4edda815f07d610247594ceeb2ebc78f05a44b4de8c5c937191b7e8b2ef221423c06df303d73deea721c25d15eed

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 5eb2d8e1b9c9bd462c808f492ef117c2
SHA1 60d398ec6e72ab670a2d9ef1b6747387c8de724e
SHA256 db85f9aae6e9a5f1664326fa3fb82fe1002a3053857724d6c8d979a07c1221a1
SHA512 df0ef770368f153104f828f1c2381bea9a79e69defd43af53bdd419b7d80144831e0c4cc8695baee9f26928f0c4a00fe4837c872313c37bce1b23e6690a93bda

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-interlocked-l1-1-0.dll

MD5 5a1569efa80fd139b561a9677a661f8a
SHA1 fb0c824688e65ed12f52fa961ef3bae5674f32af
SHA256 41c1eaf5545109e871abef7386ab1abf9d2de1762cb4720c945afa8424858b00
SHA512 1d2594c7f9757a95b41a9e6496f89c81fc96448b32cacb0c10d0db8c28a95cf33b3ad23348bcd8fb37d82bd72865d3c60944206f2e795686440de49bbcc39d7e

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-heap-l1-1-0.dll

MD5 5846d53ac41102bb6f7e1f78717fea7f
SHA1 72254f1b93f17c2c6921179c31cd19b1b4c5292d
SHA256 059dfa16c1bbe5ff3a4b5443ba5e7ad1d41e392a873b09cfef787020ca3e101f
SHA512 0c29c0f562f1cabd794d8bf7f5cef0b0213fcf52a71eb254e0122f88c6e03558cb2259caff6b46d3b055101ef5422318e48d6c7568cbf2423212b8ed4e8f0f7f

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-handle-l1-1-0.dll

MD5 53b1beee348ff035fef099922d69d588
SHA1 7bc23b19568e2683641116f770773f8bcf03376b
SHA256 3a52229bf8a9df9f69a450f1ed7afc0d813d478d148c20f88ec4169d19b0d592
SHA512 85c7ffa63483d69870cd69bf40e2b4ea5992d6b82607ee9bfc354c3bd5079e18cfe2ca0bcaa2fe493b42226f4a8097737116ea023823ce3ef177596dd80edcdb

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-file-l2-1-0.dll

MD5 50abf0a7ee67f00f247bada185a7661c
SHA1 0cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1
SHA256 f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7
SHA512 c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-file-l1-2-0.dll

MD5 3473bc217562594b5b126d7aeb9380e9
SHA1 b551b9d9aa80be070f577376e484610e01c5171a
SHA256 0d8190fd619feb20df123931108d499132f7051f1ebb0ef246082f4c52c88b22
SHA512 036b93457ade632ad68264d81ff26ee1156038e234c606882386d6babcbe722a18e9ced1655f97caecaf5fd514e261dafe999a3e9fec00cc677e177f0bf8e203

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-file-l1-1-0.dll

MD5 ecee1b7da6539c233e8dec78bfc8e1f9
SHA1 052ba049f6d8cd5579e01c9e2f85414b15e6cbf8
SHA256 249d7cd1c87738f87458b95ace4ab8f87b0de99eeefb796f6b86cba889d49b2c
SHA512 ea21fe20336b8170b2a8cd13df217e9ee87aa1d2b0ba476bee2a97c3fce57648c9ab664b9ba895d5bbbcd119f2bb6633bedc85dafbd7bf6853aa48b168a927f4

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-fibers-l1-1-0.dll

MD5 73dd550364215163ea9edb537e6b3714
SHA1 c24fcadfee877d5402e2b4f8518c4f5f4a2ce4b4
SHA256 0235c78780eff0bd34fce01d1c366e5e5936ea361676cb9711a4cfff747d457a
SHA512 2406d9d44d3ed86a95248b25cf574e0c06533cd916048a2facd68f4db48e49e8e8ce1917091bcfb273d0acc210697ceb659930c896e51464c300ec06476d8cc2

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 a17ff429442d4e5298f0faf95950a77d
SHA1 522a365dad26bedc2bfe48164dc63c2c37c993c3
SHA256 8e9d1d206da69da744d77f730233344ebe7c2a392550511698a79ce2d9180b41
SHA512 7d4e31251c171b90a0c533718655c98d8737ff220bcc43f893ff42c57ab43d82e6bd13fa94def5bb4205caec68dc8178d6b2a25ad819689f25dad01be544d5ac

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-debug-l1-1-0.dll

MD5 c68a86c180ff1fcac90d1da9a08179c1
SHA1 c287951441c957931dc4ebbee4dc9426a4501554
SHA256 2c91c4861e88c92693a1b145ebe2f69ffb90797cd42061e2d84f3d7fc009a941
SHA512 857fbf9852596ef7263d8faf970128487413c859246f58b15cec32d11576894c47211a3bd9005f86c2a28fa6b67fba96831c4953c0fa24e2373a6daecb85e121

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-datetime-l1-1-0.dll

MD5 d7ad8db12ff42d620a657127dada1d88
SHA1 0ca381c734a3a93dc5f19c58dadfdca9d1afccd8
SHA256 26054d8febab1aacf11aa5cb64055808cd33388a8e77d0b3bcbc7543b0eea3bd
SHA512 7e2d6b60adbf97b22ab4b66691e483827d5755cfc6fcb5224369ada53cbd8cda43c4694a000ea4b5cebc69a475b54df0e9694c20afd9ec62b4db7b22241bdc45

C:\Users\Admin\AppData\Local\Temp\_MEI36842\api-ms-win-core-console-l1-1-0.dll

MD5 4a8f3a1847f216b8ac3e6b53bc20bd81
SHA1 f5aadc1399a9da38087df52e509d919d743e3ea7
SHA256 29b7d786d9f421765a4f4904f79605c41e17c0a24d7f91e44c0b7b0dea489fc3
SHA512 e70d2b719517c413fa967ca1a8d224299af55d988b3cc28013aaa3677660fae9ecb6f858d31c08cd8a0888f932af1384f0eaa928c002200f0710c2d5bddced1b

C:\Users\Admin\AppData\Local\Temp\_MEI36842\_ctypes.pyd

MD5 bbd5533fc875a4a075097a7c6aba865e
SHA1 ab91e62c6d02d211a1c0683cb6c5b0bdd17cbf00
SHA256 be9828a877e412b48d75addc4553d2d2a60ae762a3551f9731b50cae7d65b570
SHA512 23ef351941f459dee7ed2cebbae21969e97b61c0d877cfe15e401c36369d2a2491ca886be789b1a0c5066d6a8835fd06db28b5b28fb6e9df84c2d0b0d8e9850e

memory/2892-133-0x00007FFE7D783000-0x00007FFE7D785000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vjmiozpn.1hr.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2892-139-0x000001DA4B380000-0x000001DA4B3A2000-memory.dmp

memory/2892-144-0x00007FFE7D780000-0x00007FFE7E241000-memory.dmp

memory/2892-145-0x00007FFE7D780000-0x00007FFE7E241000-memory.dmp

memory/2892-148-0x00007FFE7D780000-0x00007FFE7E241000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-20 22:02

Reported

2024-06-20 22:04

Platform

win11-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe"

Signatures

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\GamePersist = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Drivers Update Utility v1.exe" C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\Drivers Update Utility.exe C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A
File opened for modification C:\Windows\System32\Drivers Update Utility.exe C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3912 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe
PID 3912 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe
PID 2228 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe C:\Windows\system32\cmd.exe
PID 2228 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe C:\Windows\system32\cmd.exe
PID 5036 wrote to memory of 948 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 948 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2228 wrote to memory of 4160 N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe
PID 2228 wrote to memory of 4160 N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe
PID 4160 wrote to memory of 4068 N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe
PID 4160 wrote to memory of 4068 N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe
PID 4068 wrote to memory of 3200 N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe C:\Windows\system32\cmd.exe
PID 4068 wrote to memory of 3200 N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe C:\Windows\system32\cmd.exe
PID 3200 wrote to memory of 4868 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\schtasks.exe
PID 3200 wrote to memory of 4868 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\schtasks.exe
PID 4068 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe C:\Windows\system32\cmd.exe
PID 4068 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe C:\Windows\system32\cmd.exe
PID 1724 wrote to memory of 4320 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\schtasks.exe
PID 1724 wrote to memory of 4320 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\schtasks.exe
PID 2228 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe
PID 2228 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe
PID 2036 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe
PID 2036 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe
PID 4816 wrote to memory of 3700 N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe C:\Windows\system32\cmd.exe
PID 4816 wrote to memory of 3700 N/A C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe C:\Windows\system32\cmd.exe
PID 3700 wrote to memory of 952 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\schtasks.exe
PID 3700 wrote to memory of 952 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\schtasks.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe

"C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe"

C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe

"C:\Users\Admin\AppData\Local\Temp\184b932acd14114ec91166ecb0315b67861295e476cf456dfb05dc6d6e9fe958.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "powershell -Command "Add-MpPreference -ExclusionPath 'C:'""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath 'C:'"

C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe

"C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe"

C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe

"C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "schtasks /create /tn "GameTask" /tr "C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe" /sc onlogon /rl highest /f"

C:\Windows\system32\schtasks.exe

schtasks /create /tn "GameTask" /tr "C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v1.exe" /sc onlogon /rl highest /f

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "schtasks /query /tn "GameTask""

C:\Windows\system32\schtasks.exe

schtasks /query /tn "GameTask"

C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe

"C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe"

C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe

"C:\Users\Admin\AppData\Local\Temp\Drivers Update Utility v2.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "schtasks /create /tn "MicrosoftUpdateTask" /tr "C:\Windows\System32\Drivers Update Utility.exe" /sc onlogon /rl highest /f"

C:\Windows\system32\schtasks.exe

schtasks /create /tn "MicrosoftUpdateTask" /tr "C:\Windows\System32\Drivers Update Utility.exe" /sc onlogon /rl highest /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 185.199.111.133:443 raw.githubusercontent.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 133.111.199.185.in-addr.arpa udp
GB 20.26.156.215:443 github.com tcp
GB 20.26.156.215:443 github.com tcp
US 185.199.111.133:443 raw.githubusercontent.com tcp
BG 93.123.39.220:8443 bigdev2030.ddns.net tcp
BG 93.123.39.220:8443 bigdev2030.ddns.net tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI39122\ucrtbase.dll

MD5 3b337c2d41069b0a1e43e30f891c3813
SHA1 ebee2827b5cb153cbbb51c9718da1549fa80fc5c
SHA256 c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7
SHA512 fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499

C:\Users\Admin\AppData\Local\Temp\_MEI39122\python312.dll

MD5 3c388ce47c0d9117d2a50b3fa5ac981d
SHA1 038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256 c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512 e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35

C:\Users\Admin\AppData\Local\Temp\_MEI39122\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

C:\Users\Admin\AppData\Local\Temp\_MEI39122\base_library.zip

MD5 9f57ec99436720eadbfeae4f392b0ddb
SHA1 30370729867e79b8c3c566970999ac3f0b5b17b3
SHA256 f83623543f35d7e6c875b28bc64db2a2036b11de1301cb807eed0dcb02d8fd7e
SHA512 4b9c72698c8daf2292cb052edc3ec7edfd5d6bf616684beeff9b81b61e0045d8abba79c7ec631b1adcc7ac1c453384bff6cddea39b96736e8e8cc075c544502d

C:\Users\Admin\AppData\Local\Temp\_MEI39122\_ctypes.pyd

MD5 bbd5533fc875a4a075097a7c6aba865e
SHA1 ab91e62c6d02d211a1c0683cb6c5b0bdd17cbf00
SHA256 be9828a877e412b48d75addc4553d2d2a60ae762a3551f9731b50cae7d65b570
SHA512 23ef351941f459dee7ed2cebbae21969e97b61c0d877cfe15e401c36369d2a2491ca886be789b1a0c5066d6a8835fd06db28b5b28fb6e9df84c2d0b0d8e9850e

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 1f0ab051a3f210db40a8c5e813ba0428
SHA1 e2ec19439618df1d6f34ee7c76108e3ea90a8b14
SHA256 2d4cdda6d6aec0b1a84d84528380c5650683b8eed680f3cafd821ac7f422070c
SHA512 a8ba535580d6756ac30e725411980a8d17e9a8aa1229233bb7a9b15c55b18b61136772d5d75cce0edf21b0f300bbd4d2458a4c69762261e928ef3cb7d5a14bdd

C:\Users\Admin\AppData\Local\Temp\_MEI39122\_queue.pyd

MD5 6e0cb85dc94e351474d7625f63e49b22
SHA1 66737402f76862eb2278e822b94e0d12dcb063c5
SHA256 3f57f29abd86d4dc8f4ca6c3f190ebb57d429143d98f0636ff5117e08ed81f9b
SHA512 1984b2fc7f9bbdf5ba66716fc60dcfd237f38e2680f2fc61f141ff7e865c0dbdd7cdc47b3bc490b426c6cfe9f3f9e340963abf428ea79eb794b0be7d13001f6a

C:\Users\Admin\AppData\Local\Temp\_MEI39122\_socket.pyd

MD5 dc06f8d5508be059eae9e29d5ba7e9ec
SHA1 d666c88979075d3b0c6fd3be7c595e83e0cb4e82
SHA256 7daff6aa3851a913ed97995702a5dfb8a27cb7cf00fb496597be777228d7564a
SHA512 57eb36bc1e9be20c85c34b0a535b2349cb13405d60e752016e23603c4648939f1150e4dbebc01ec7b43eb1a6947c182ccb8a806e7e72167ad2e9d98d1fd94ab3

C:\Users\Admin\AppData\Local\Temp\_MEI39122\_lzma.pyd

MD5 05e8b2c429aff98b3ae6adc842fb56a3
SHA1 834ddbced68db4fe17c283ab63b2faa2e4163824
SHA256 a6e2a5bb7a33ad9054f178786a031a46ea560faeef1fb96259331500aae9154c
SHA512 badeb99795b89bc7c1f0c36becc7a0b2ce99ecfd6f6bb493bda24b8e57e6712e23f4c509c96a28bc05200910beddc9f1536416bbc922331cae698e813cbb50b3

C:\Users\Admin\AppData\Local\Temp\_MEI39122\_hashlib.pyd

MD5 eedb6d834d96a3dffffb1f65b5f7e5be
SHA1 ed6735cfdd0d1ec21c7568a9923eb377e54b308d
SHA256 79c4cde23397b9a35b54a3c2298b3c7a844454f4387cb0693f15e4facd227dd2
SHA512 527bd7bb2f4031416762595f4ce24cbc6254a50eaf2cc160b930950c4f2b3f5e245a486972148c535f8cd80c78ec6fa8c9a062085d60db8f23d4b21e8ae4c0ad

C:\Users\Admin\AppData\Local\Temp\_MEI39122\_decimal.pyd

MD5 3055edf761508190b576e9bf904003aa
SHA1 f0dc8d882b5cd7955cc6dfc8f9834f70a83c7890
SHA256 e4104e47399d3f635a14d649f61250e9fd37f7e65c81ffe11f099923f8532577
SHA512 87538fe20bd2c1150a8fefd0478ffd32e2a9c59d22290464bf5dfb917f6ac7ec874f8b1c70d643a4dc3dd32cbe17e7ea40c0be3ea9dd07039d94ab316f752248

C:\Users\Admin\AppData\Local\Temp\_MEI39122\_cffi_backend.cp312-win_amd64.pyd

MD5 0572b13646141d0b1a5718e35549577c
SHA1 eeb40363c1f456c1c612d3c7e4923210eae4cdf7
SHA256 d8a76d1e31bbd62a482dea9115fc1a109cb39af4cf6d1323409175f3c93113a7
SHA512 67c28432ca8b389acc26e47eb8c4977fddd4af9214819f89df07fecbc8ed750d5f35807a1b195508dd1d77e2a7a9d7265049dcfbfe7665a7fd1ba45da1e4e842

C:\Users\Admin\AppData\Local\Temp\_MEI39122\_bz2.pyd

MD5 223fd6748cae86e8c2d5618085c768ac
SHA1 dcb589f2265728fe97156814cbe6ff3303cd05d3
SHA256 f81dc49eac5ecc528e628175add2ff6bda695a93ea76671d7187155aa6326abb
SHA512 9c22c178417b82e68f71e5b7fe7c0c0a77184ee12bd0dc049373eace7fa66c89458164d124a9167ae760ff9d384b78ca91001e5c151a51ad80c824066b8ecce6

C:\Users\Admin\AppData\Local\Temp\_MEI39122\unicodedata.pyd

MD5 16be9a6f941f1a2cb6b5fca766309b2c
SHA1 17b23ae0e6a11d5b8159c748073e36a936f3316a
SHA256 10ffd5207eeff5a836b330b237d766365d746c30e01abf0fd01f78548d1f1b04
SHA512 64b7ecc58ae7cf128f03a0d5d5428aaa0d4ad4ae7e7d19be0ea819bbbf99503836bfe4946df8ee3ab8a92331fdd002ab9a9de5146af3e86fef789ce46810796b

C:\Users\Admin\AppData\Local\Temp\_MEI39122\select.pyd

MD5 92b440ca45447ec33e884752e4c65b07
SHA1 5477e21bb511cc33c988140521a4f8c11a427bcc
SHA256 680df34fb908c49410ac5f68a8c05d92858acd111e62d1194d15bdce520bd6c3
SHA512 40e60e1d1445592c5e8eb352a4052db28b1739a29e16b884b0ba15917b058e66196988214ce473ba158704837b101a13195d5e48cb1dc2f07262dfecfe8d8191

C:\Users\Admin\AppData\Local\Temp\_MEI39122\libssl-3.dll

MD5 19a2aba25456181d5fb572d88ac0e73e
SHA1 656ca8cdfc9c3a6379536e2027e93408851483db
SHA256 2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512 df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

C:\Users\Admin\AppData\Local\Temp\_MEI39122\libcrypto-3.dll

MD5 e547cf6d296a88f5b1c352c116df7c0c
SHA1 cafa14e0367f7c13ad140fd556f10f320a039783
SHA256 05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA512 9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-utility-l1-1-0.dll

MD5 4653da8959b7fe33d32e61e472507d54
SHA1 6d071b52f40dc609f40989b3dd0fb53124607df8
SHA256 b7e186a946119791e42f17e623732e23f864f98b592c41d95b3da0532ea9d5f3
SHA512 81e17cf4b64ed5efba191d35b1877384544557c3001efa0321a755a35413740ae66e39e39f573d3184ef8c893c739a74d37f170fe540f81177a83b44bc18ba6d

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-time-l1-1-0.dll

MD5 9bc895e2cc140e168fa55372fce8682b
SHA1 579d71e19331625dda84baa9d8b81dd3bafc9913
SHA256 287f80b2b330cc5f9fdf47de50b189993ce925b5e2b7a6da5cdaef9c7d5f36c1
SHA512 de0e5c6f9656106fcf2443d863d26c4b16bbb5b40e676199f9c459be02b4837a2d32bddda82543eb2e0bf14a27edea7f5d506914da8d63da77ed7ccd2204aa65

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-string-l1-1-0.dll

MD5 2e657fe299572eacdac67f4b9f603857
SHA1 eb4fbc0147d4df5d4ef81953bc1265d505a19297
SHA256 ec3c2bff10b9469ac9c6ed109307731a1a4694fb54856ddd082a2ffd3cc34df2
SHA512 ee3899584ecece342accbd73d681358cfe8b4fd2ed07cf3034b14f3d04e3b03e5d6d041a0afcb0b2b2b5afac118032317b5eca00d11f7703d9d0dae0e3ac38f7

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-stdio-l1-1-0.dll

MD5 4a3342bce6b58ef810e804f1c5915e40
SHA1 fe636cca0a57e92bb27e0f76075110981d3b3639
SHA256 2509179079a598b3e5dfd856d8e03e45de7379c628901dbd869ec4332ddb618c
SHA512 f0c626f88f016c17fa45ea62441dd862a9575666ec06734f61d8e153c5f46a016fe1d9271293a8e29afbd167f7a381e3ee04cb413736bc224ac31e0fe760341c

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-runtime-l1-1-0.dll

MD5 dc8bfceec3d20100f29fd4798415dc00
SHA1 bd4764be2833f40c1cc54229c759f83d67ae5294
SHA256 4950d0a97cb18971355247feccfd6f8ea24e46bca30f54540c050e4631ec57a8
SHA512 cc7899ad716a81af46d73b1cb8ded51aee9619f2accc35859e351fb8ee4f965f5bcc9adbb7353ca7a3c8e39d36c09481f66519cb173da1d2578718c764fb6fae

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-process-l1-1-0.dll

MD5 38d1c8d2aa2023d85aca69286d79fb78
SHA1 a97e806268dc4ee781ec2bfb654ed8bf91c2a83a
SHA256 381a09a63b5818a2499144adbd8c5f6bbcfce93d643e9920cc54485006fbcc48
SHA512 fc71441009ebe69dfbc04a791cb401306cb88f7bed5290cd899e234d290209917dc7fbd0d0d1a16ceb056858c77306b8ee5f3c17432f3594904b73b20162738e

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-math-l1-1-0.dll

MD5 a12569b252b6761a6330d2ffb6c2983b
SHA1 cc6bdb88b252144af816976a181d2b3b961ce389
SHA256 ab0de0cf89f88b947e01a5ab630d71384ad69f903cef063ccb10de54d061ea2e
SHA512 ee9cb0e2c613374348a34e4a65c83da8d35e6e841f50eed726ff397c7bb6ec430ed200b3b1a541041a91ebe5ae0c96270ee7b891c8c173b340c82abd2cdf8750

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-locale-l1-1-0.dll

MD5 78fc4a7e489f64ea5e0a745c12477fd8
SHA1 51ab73b5142ee2f742abdaedf427690613a19f4a
SHA256 c12c28e3391a8c8adcabe4632470de824118c56338f46fcd8b99257709f50604
SHA512 c9064ff0b39421b28720e65e70695a997995cbec80f1534d88b886bda1797a7316d9b61e458b894b528c7bce21c36f1d4acd916de96d0cdfde59107ea93cd5d7

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-heap-l1-1-0.dll

MD5 481282554b34e19c77978dc7888434e6
SHA1 bd33f1189fc79ac57716f9d030ef0bdd30205115
SHA256 8895c5ab2152a7f25f0c44a3457867229046952106d422331a1c57ad7935b47e
SHA512 fbe98fda91618dd980709babd8e56b8c4c4ff370e6de23075f89303aafffd723dddfd270f388c573914385e957add756bfe2b1fcef5f9f86cb30e111177a52e9

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 1fd59e1dd71eb3bdadb313029710dc33
SHA1 82f5de117d9c55247da873ab8ad23f4e07841366
SHA256 953e4403094ec0c3e8c3a9ab38012cc36d86ac5fe3fff2d6b6c5f51f75737c46
SHA512 69608ff0127587b93db86c8cb27a932fa4b550c7d8d908f9fb8579ba2bccc6d43e7283363f7b46dd39a40a8c790a030028a78302703658fd5d68f5ee9452a5aa

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-environment-l1-1-0.dll

MD5 4eeb879fceeae59927f98a1a199b59ca
SHA1 3bb833edf4c10b42b7b376b93644ccc7f9a4b0f8
SHA256 e1b95e27cad9da4f0bd8bf4c913f49b9b8da6d28303f2946b55da3bd7feb36a3
SHA512 6a43eb0c660395a60d17401e948bc4da010261197ea13b5c9e043e7ee93c30eb17efb9b6b138ecdd77ddc3d0caa98921b57bfc244f6cd554417a0fba5c9407b0

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-convert-l1-1-0.dll

MD5 55e742035343af7b93caeeb71d322bed
SHA1 121134dfeca618ec3fae3fb640e541141d0c7b65
SHA256 2364fa428deba813b8a27b369acea8ed365aa5c9da776d57e146576920746f0e
SHA512 601474b8c9185cb734df191f4382590f1466c0a32773e17c73afa5c1446dc648253d44e4ebad6ce0d29288afb1d7794c09ff0d7cfe81a3adc3dc26b3da46103d

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-crt-conio-l1-1-0.dll

MD5 43760078912b411595bcded3b2eb063d
SHA1 bd00cd60fd094b87ab0cff30cd2afe0a78853f22
SHA256 0a9bcaa55326373200396bb1af46b3058f8f7af7be3289544dddbafdec420fea
SHA512 d779f67bbb6e9867bcef7667c28e0032c01f36b8ea418504e9683240a6c0d9640b24d1dc5fa78cc9dcc4515f7be0d314f27ebcebc047b2e0f71680905d87827b

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-util-l1-1-0.dll

MD5 85a8b925d50105db8250fa0878bb146e
SHA1 4b56d7eb81e0666e0cd047f9205584a97ce91a01
SHA256 f3324803591d2794bad583c71d5036976941631a5f0e6d67c71fc8ba29f30ba8
SHA512 cb074508052fafa8baa2e988e0f4241411a543e55a6a9fee915029c6aa87c93cce1f0b14fe0658361b6b4ab6880b31a950c215404c0d71d8a862d4e74ab3b797

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-timezone-l1-1-0.dll

MD5 953c63ef10ec30ef7c89a6f0f7074041
SHA1 4b4f1ff3085fded9dbd737f273585ad43175b0a3
SHA256 c93954167c12e15b58ac95240d2e0a2fbd94561d739d9f6aca906d9c30453496
SHA512 b4534785e4d02ad387e3c6082884d438cc4b3cd8758aabcf99620052f5842dbd298351bc1723c274d4f7d3fce0cc940df3d47865fece2f07cdb1151376ba852e

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-synch-l1-2-0.dll

MD5 b865442fb6836a9b933a216109ff3d0f
SHA1 15011fcaea649ca016fa93996639f59c23b74106
SHA256 498194cfe8b1138385595a7db3863adf29a9663551d746fb64648ffd075186b3
SHA512 eeb9fa00a941c4b30320fbb9ecc2717e53d13cd12394500d795be742dbe25c5fdf8590e9fe7f3b210a9d9aa07c7392419823a6a947591e7a38707a87309a2b76

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-synch-l1-1-0.dll

MD5 2c4be18e4d56e056b3fb7c2afb032e9e
SHA1 9620c91a98175dddccc1f1af78393143249e9eb9
SHA256 56657da3db3877624f5dad3980df3235fe7e1038916627c0845b5001199d513f
SHA512 18cbb5671ed99b475c7f6ff2d41943ba6d28fbbd781884bf069d1aa83f051c00d61baa11459dcca4fe2a4bc26c3540e1f598e4e0ae59a5e18d340a68b695ed78

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-string-l1-1-0.dll

MD5 9ab1bde57b958090d53de161469e5e8d
SHA1 8452aed000b2e77040ba8b1e5762532cdf5a60ad
SHA256 199c988d566f19e8c67f4cd7147a7df591cd2f2d648cbc511a5e4580346e75f4
SHA512 cf53c6885e154a05f8773d6b66a605049d70cc544f22a11d423c885608cd387446306ce6dfee2cc4ee9387cdc0a50da55948b5e55ad94acde7c7fd04fe38a137

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 c03daa9e875ff8638f631b1c95f4b342
SHA1 71eaeaccea8a302f87d1594ce612449c1195e882
SHA256 a281ae7a487ecea619e696903e5a8119ae3f9e9eb2f0b64b31a8324b530a4d35
SHA512 efa6ca2710f9827888f2cfcb87a321d66593b39988ebf743f37e2b8fe77dba9517bdd8571d0be7573cd6e1c786c1edba10857cfb6060e315aa0d46a16523d43b

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-profile-l1-1-0.dll

MD5 430d7cdd96bc499ba9eb84bb36aa301a
SHA1 48b43f6e4ffa8423966d06b417b82c5f72525dd9
SHA256 3e16b030a162ee3b4f6bf612af75d02a768a87f2d6a41a83f5adab2ec3c24dd1
SHA512 51042ebca24086e1d0015fa921816a2f3c56065e1e15190b48c58656eb88610d64acacb87584981963cab501985c2cb68e53075cf5e0c65761bbddaf56fbbab0

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-processthreads-l1-1-1.dll

MD5 b1ba47d8389c40c2dda3c56cbed14fc5
SHA1 2eef9ffa32171d53affa44e3db7727aa383f7fac
SHA256 c7277c05dc6b905fad5cb930b0ecfbbc4676b46974b4571e54ca44cb6f6be404
SHA512 466e31f17f73bda5149343b23f4966502a8597d2a2e43f9a6c9c32387451d92c6b658ccaae27044e68e4a9fd0ef9c89e32dc7639d59fcf04c596b6abfa09658b

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-processthreads-l1-1-0.dll

MD5 d21be88a58960edfe83ccbbdf5c4103d
SHA1 3cb0d010837b77102e77ca62e1033ef4eb5473ac
SHA256 3e909b4951e485de391f9a101e513b32c6d3507674c4d666ad3105b939b25c24
SHA512 99b1fda3ec9292a59ed528ab243b4f8ac63e2d7b219135f26050bb7dd124a5d5dc4a14a69383a8aa0b03f0f0a3bccf0c233ef09b8e3d3bdf43d0aa1cfc1a3992

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 df64597430e1126c3ba0fe5ecf995004
SHA1 3e32ad558501fb9d108f885a55841605be641628
SHA256 9638950211cbdcdaeb886cab277573391bf7dda2fbdb24fc18d31125dc8a7c24
SHA512 e16c1f5468bf2fc90b66b4b66dbad62cdbe29180f8da8ab8ad28d1b0c418cb96eadf24bb54f2ee9bcfe3176256d05f7eb591b6f908e47bd420ba22768fe0ea61

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 94fce2f4b244d3968b75a4a61b2347ab
SHA1 c5898af5fd941c19fcdd949c6b4e2bb090d040d2
SHA256 c513bdc265654d2e9a304423f299fb46953631f0d78af8c1d397cd58b491475a
SHA512 1afe1f3a9b803c5758ff24376fe040d856b5ca814717b490464260c9c78e70ce6c166efbcc98e26ac12dd6173285b4863da7df4ff644d1d8150f8ac4b47113e1

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-memory-l1-1-0.dll

MD5 5e93bf4aa81616285858ca455343b6d3
SHA1 8de55be56b6520801177f757d9e3235ec88085f7
SHA256 c44ec29a51145281372007d241a2cc15b00d0bacc8adfaac61e8e82efe8ea6a3
SHA512 e6a46dad1d7125dbaaf9d020100d7ec321620e38fdd1c931af74e8ec25e841c52555ec9646a895ad4450de94f70e82e9a237c2895ddfd16769b07cb73ad827e0

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-localization-l1-2-0.dll

MD5 0414909b279ea61ca344edbe8e33e40b
SHA1 4ece0dabe954c43f9bd5032de76ec29c47b22e10
SHA256 05b0c773a77850f3d50ddb4b82cc4d5f19316fe1aaa65e21b4709ae73f60a28e
SHA512 edbd33540cd1ef69f2ce824cfb991903ec6e4edda815f07d610247594ceeb2ebc78f05a44b4de8c5c937191b7e8b2ef221423c06df303d73deea721c25d15eed

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 5eb2d8e1b9c9bd462c808f492ef117c2
SHA1 60d398ec6e72ab670a2d9ef1b6747387c8de724e
SHA256 db85f9aae6e9a5f1664326fa3fb82fe1002a3053857724d6c8d979a07c1221a1
SHA512 df0ef770368f153104f828f1c2381bea9a79e69defd43af53bdd419b7d80144831e0c4cc8695baee9f26928f0c4a00fe4837c872313c37bce1b23e6690a93bda

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-interlocked-l1-1-0.dll

MD5 5a1569efa80fd139b561a9677a661f8a
SHA1 fb0c824688e65ed12f52fa961ef3bae5674f32af
SHA256 41c1eaf5545109e871abef7386ab1abf9d2de1762cb4720c945afa8424858b00
SHA512 1d2594c7f9757a95b41a9e6496f89c81fc96448b32cacb0c10d0db8c28a95cf33b3ad23348bcd8fb37d82bd72865d3c60944206f2e795686440de49bbcc39d7e

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-heap-l1-1-0.dll

MD5 5846d53ac41102bb6f7e1f78717fea7f
SHA1 72254f1b93f17c2c6921179c31cd19b1b4c5292d
SHA256 059dfa16c1bbe5ff3a4b5443ba5e7ad1d41e392a873b09cfef787020ca3e101f
SHA512 0c29c0f562f1cabd794d8bf7f5cef0b0213fcf52a71eb254e0122f88c6e03558cb2259caff6b46d3b055101ef5422318e48d6c7568cbf2423212b8ed4e8f0f7f

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-handle-l1-1-0.dll

MD5 53b1beee348ff035fef099922d69d588
SHA1 7bc23b19568e2683641116f770773f8bcf03376b
SHA256 3a52229bf8a9df9f69a450f1ed7afc0d813d478d148c20f88ec4169d19b0d592
SHA512 85c7ffa63483d69870cd69bf40e2b4ea5992d6b82607ee9bfc354c3bd5079e18cfe2ca0bcaa2fe493b42226f4a8097737116ea023823ce3ef177596dd80edcdb

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-file-l2-1-0.dll

MD5 50abf0a7ee67f00f247bada185a7661c
SHA1 0cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1
SHA256 f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7
SHA512 c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-file-l1-2-0.dll

MD5 3473bc217562594b5b126d7aeb9380e9
SHA1 b551b9d9aa80be070f577376e484610e01c5171a
SHA256 0d8190fd619feb20df123931108d499132f7051f1ebb0ef246082f4c52c88b22
SHA512 036b93457ade632ad68264d81ff26ee1156038e234c606882386d6babcbe722a18e9ced1655f97caecaf5fd514e261dafe999a3e9fec00cc677e177f0bf8e203

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-file-l1-1-0.dll

MD5 ecee1b7da6539c233e8dec78bfc8e1f9
SHA1 052ba049f6d8cd5579e01c9e2f85414b15e6cbf8
SHA256 249d7cd1c87738f87458b95ace4ab8f87b0de99eeefb796f6b86cba889d49b2c
SHA512 ea21fe20336b8170b2a8cd13df217e9ee87aa1d2b0ba476bee2a97c3fce57648c9ab664b9ba895d5bbbcd119f2bb6633bedc85dafbd7bf6853aa48b168a927f4

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-fibers-l1-1-0.dll

MD5 73dd550364215163ea9edb537e6b3714
SHA1 c24fcadfee877d5402e2b4f8518c4f5f4a2ce4b4
SHA256 0235c78780eff0bd34fce01d1c366e5e5936ea361676cb9711a4cfff747d457a
SHA512 2406d9d44d3ed86a95248b25cf574e0c06533cd916048a2facd68f4db48e49e8e8ce1917091bcfb273d0acc210697ceb659930c896e51464c300ec06476d8cc2

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 a17ff429442d4e5298f0faf95950a77d
SHA1 522a365dad26bedc2bfe48164dc63c2c37c993c3
SHA256 8e9d1d206da69da744d77f730233344ebe7c2a392550511698a79ce2d9180b41
SHA512 7d4e31251c171b90a0c533718655c98d8737ff220bcc43f893ff42c57ab43d82e6bd13fa94def5bb4205caec68dc8178d6b2a25ad819689f25dad01be544d5ac

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-debug-l1-1-0.dll

MD5 c68a86c180ff1fcac90d1da9a08179c1
SHA1 c287951441c957931dc4ebbee4dc9426a4501554
SHA256 2c91c4861e88c92693a1b145ebe2f69ffb90797cd42061e2d84f3d7fc009a941
SHA512 857fbf9852596ef7263d8faf970128487413c859246f58b15cec32d11576894c47211a3bd9005f86c2a28fa6b67fba96831c4953c0fa24e2373a6daecb85e121

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-datetime-l1-1-0.dll

MD5 d7ad8db12ff42d620a657127dada1d88
SHA1 0ca381c734a3a93dc5f19c58dadfdca9d1afccd8
SHA256 26054d8febab1aacf11aa5cb64055808cd33388a8e77d0b3bcbc7543b0eea3bd
SHA512 7e2d6b60adbf97b22ab4b66691e483827d5755cfc6fcb5224369ada53cbd8cda43c4694a000ea4b5cebc69a475b54df0e9694c20afd9ec62b4db7b22241bdc45

C:\Users\Admin\AppData\Local\Temp\_MEI39122\api-ms-win-core-console-l1-1-0.dll

MD5 4a8f3a1847f216b8ac3e6b53bc20bd81
SHA1 f5aadc1399a9da38087df52e509d919d743e3ea7
SHA256 29b7d786d9f421765a4f4904f79605c41e17c0a24d7f91e44c0b7b0dea489fc3
SHA512 e70d2b719517c413fa967ca1a8d224299af55d988b3cc28013aaa3677660fae9ecb6f858d31c08cd8a0888f932af1384f0eaa928c002200f0710c2d5bddced1b

C:\Users\Admin\AppData\Local\Temp\_MEI39122\libffi-8.dll

MD5 0f8e4992ca92baaf54cc0b43aaccce21
SHA1 c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256 eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA512 6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

C:\Users\Admin\AppData\Local\Temp\_MEI39122\python3.dll

MD5 79b02450d6ca4852165036c8d4eaed1f
SHA1 ce9ff1b302426d4c94a2d3ea81531d3cb9e583e4
SHA256 d2e348e615a5d3b08b0bac29b91f79b32f0c1d0be48976450042462466b51123
SHA512 47044d18db3a4dd58a93b43034f4fafa66821d157dcfefb85fca2122795f4591dc69a82eb2e0ebd9183075184368850e4caf9c9fea0cfe6f766c73a60ffdf416

memory/948-133-0x00007FFB4EDA3000-0x00007FFB4EDA5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kqvarmcl.yty.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/948-142-0x000001B572290000-0x000001B5722B2000-memory.dmp

memory/948-143-0x00007FFB4EDA0000-0x00007FFB4F862000-memory.dmp

memory/948-144-0x00007FFB4EDA0000-0x00007FFB4F862000-memory.dmp

memory/948-145-0x00007FFB4EDA0000-0x00007FFB4F862000-memory.dmp

memory/948-146-0x00007FFB4EDA0000-0x00007FFB4F862000-memory.dmp

memory/948-149-0x00007FFB4EDA0000-0x00007FFB4F862000-memory.dmp