Analysis

  • max time kernel
    1790s
  • max time network
    1151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2024 16:54

General

  • Target

    sample1.exe

  • Size

    45KB

  • MD5

    d4e300eb8ed5bc378b50c2c0fa73dd82

  • SHA1

    de0f866207fa8d5018a82aa75261a65b7d6697bd

  • SHA256

    80e3e1b6447f2f22593ca40b29a153060c2c92bb5e237d2932a275f87dc16146

  • SHA512

    ffaeba3bd79aed5b1f812dcb07efdddf27ec38c788a042f78c57d3caabb363a8c6720df2d0cf9b830b8c73dea2d8350e5e700408c4e831ce3287793aed9b5a8f

  • SSDEEP

    768:+Dl1L0/tSsg+vpZzXOC/5G6hKCJmt02XtRkbyh2M3qQYHzYOahWlte:wzL01rrzXOCRthKCJa0wkby0LYOawHe

Malware Config

Extracted

Family

xworm

C2

147.185.221.16:40164

147.185.221.20:40164

Attributes
  • install_file

    System Volume Information Prefetch.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample1.exe
    "C:\Users\Admin\AppData\Local\Temp\sample1.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp3A5.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5600
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:5640
  • C:\Users\Admin\Desktop\sfb.exe
    "C:\Users\Admin\Desktop\sfb.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Users\Admin\Desktop\sfb.exe
      "C:\Users\Admin\Desktop\sfb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2116
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\settings.json
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:3568
  • C:\Users\Admin\Desktop\sfb.exe
    "C:\Users\Admin\Desktop\sfb.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Users\Admin\Desktop\sfb.exe
      "C:\Users\Admin\Desktop\sfb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4644
  • C:\Users\Admin\Desktop\sfb.exe
    "C:\Users\Admin\Desktop\sfb.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:6056
    • C:\Users\Admin\Desktop\sfb.exe
      "C:\Users\Admin\Desktop\sfb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI60562\tcl\encoding\euc-cn.enc

    Filesize

    84KB

    MD5

    c5aa0d11439e0f7682dae39445f5dab4

    SHA1

    73a6d55b894e89a7d4cb1cd3ccff82665c303d5c

    SHA256

    1700af47dc012a48cec89cf1dfae6d1d0d2f40ed731eff6ca55296a055a11c00

    SHA512

    eee6058bd214c59bcc11e6de7265da2721c119cc9261cfd755a98e270ff74d2d73e3e711aa01a0e3414c46d82e291ef0df2ad6c65ca477c888426d5a1d2a3bc5

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\VCRUNTIME140.dll

    Filesize

    116KB

    MD5

    be8dbe2dc77ebe7f88f910c61aec691a

    SHA1

    a19f08bb2b1c1de5bb61daf9f2304531321e0e40

    SHA256

    4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

    SHA512

    0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\VCRUNTIME140_1.dll

    Filesize

    48KB

    MD5

    f8dfa78045620cf8a732e67d1b1eb53d

    SHA1

    ff9a604d8c99405bfdbbf4295825d3fcbc792704

    SHA256

    a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

    SHA512

    ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\_asyncio.pyd

    Filesize

    69KB

    MD5

    477dba4d6e059ea3d61fad7b6a7da10e

    SHA1

    1f23549e60016eeed508a30479886331b22f7a8b

    SHA256

    5bebeb765ab9ef045bc5515166360d6f53890d3ad6fc360c20222d61841410b6

    SHA512

    8119362c2793a4c5da25a63ca68aa3b144db7e4c08c80cbe8c8e7e8a875f1bd0c30e497208ce20961ddb38d3363d164b6e1651d3e030ed7b8ee5f386faf809d2

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\_bz2.pyd

    Filesize

    83KB

    MD5

    5bebc32957922fe20e927d5c4637f100

    SHA1

    a94ea93ee3c3d154f4f90b5c2fe072cc273376b3

    SHA256

    3ed0e5058d370fb14aa5469d81f96c5685559c054917c7280dd4125f21d25f62

    SHA512

    afbe80a73ee9bd63d9ffa4628273019400a75f75454667440f43beb253091584bf9128cbb78ae7b659ce67a5faefdba726edb37987a4fe92f082d009d523d5d6

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\_ctypes.pyd

    Filesize

    122KB

    MD5

    fb454c5e74582a805bc5e9f3da8edc7b

    SHA1

    782c3fa39393112275120eaf62fc6579c36b5cf8

    SHA256

    74e0e8384f6c2503215f4cf64c92efe7257f1aec44f72d67ad37dc8ba2530bc1

    SHA512

    727ada80098f07849102c76b484e9a61fb0f7da328c0276d82c6ee08213682c89deeb8459139a3fbd7f561bffaca91650a429e1b3a1ff8f341cebdf0bfa9b65d

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\_decimal.pyd

    Filesize

    251KB

    MD5

    492c0c36d8ed1b6ca2117869a09214da

    SHA1

    b741cae3e2c9954e726890292fa35034509ef0f6

    SHA256

    b8221d1c9e2c892dd6227a6042d1e49200cd5cb82adbd998e4a77f4ee0e9abf1

    SHA512

    b8f1c64ad94db0252d96082e73a8632412d1d73fb8095541ee423df6f00bc417a2b42c76f15d7e014e27baae0ef50311c3f768b1560db005a522373f442e4be0

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-console-l1-1-0.dll

    Filesize

    13KB

    MD5

    feb41d426bf3cdfcc7d21464c26aed53

    SHA1

    97a56392ec04e202d59978dc6670d5e76a2be6c1

    SHA256

    299bf8705f61598548975e0b122debedf5dc928fc874801d8988d64b7d623da1

    SHA512

    2b962112bad1a754e2cbd3f3f29538dcf1132fa59e298bfa18d1b706d967735e02c524c3a993a2040a9ae94e387ede394c7f67d348e50e0ef40815ce67630866

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-datetime-l1-1-0.dll

    Filesize

    13KB

    MD5

    faecbfdacc6dc01b0455ea7b4576de99

    SHA1

    62fe4962a5900ffb94a05e6577dc5d63d90b3000

    SHA256

    2b2ed0fe1be4713b33d150828ec0813fd4ecdcac8021a39e37fd8fe64bd21157

    SHA512

    68dca96b1cf711e5fa283c355183a3f8f2db84081f07fd534d36dc68b4ea6e32e58b9be38fd51d743212d2d698ae656474b30c85a86321d58d1c0947911602e6

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-debug-l1-1-0.dll

    Filesize

    13KB

    MD5

    9936abac26b97057e61a5a8346bc26c9

    SHA1

    16f37a510ecc2a9119e99797e99c4d2468eb39f6

    SHA256

    d4de4b05b001028456087425ff66044b62bfda3076bff084f9be7843f517c584

    SHA512

    7404c4a2f884c952a9d0bca9dde757d05db9a74892823d239e70afa40360220896e22853dad19f6d3e8a130ef6a936ded1d53af99d0afd7fd23babd2e0b0842a

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-errorhandling-l1-1-0.dll

    Filesize

    13KB

    MD5

    da9189023a6b7872de881052f3b990f9

    SHA1

    55bcebcfd6805ee5bdad78a425ac5e123ab7e807

    SHA256

    f38193429c05622df65bfa1428895197b851d981875737c55f1cfe04a88664ef

    SHA512

    b9d60a5588d835fd7eea7b9bec6564377505b53169db281bf80fc994657e5a3dc506d58fdcdec5b6f79346fd7c172546b59315d276fa691d2b7b495ecc23c2e2

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-file-l1-1-0.dll

    Filesize

    16KB

    MD5

    8b03d7c248a3b8d5a3ad1029af37c889

    SHA1

    868a0dde330fdcbf6d0d23900f2c65720ddf9a90

    SHA256

    4358b538205e9637e8ded05e8490dc0b673e0f756803da451e933411b0e0cb9e

    SHA512

    76d7e1ea0762a51cd5597e06e98dbd6af17124af57d1729e71ac994ffe7bbbf8be02e57dde31f76a5ea5e7194cceb24185d14fe378780dd1f1afd228fc012d9a

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-file-l1-2-0.dll

    Filesize

    13KB

    MD5

    fa6953700659b11c2d82fb521d2e8664

    SHA1

    07c7d14fdfd1686a424820f77733d1d4f3c75e31

    SHA256

    4dcc72554ffaa121decaf6e5bd3081198f017d735a07cc6d23d8a56b1383a61e

    SHA512

    1300c6ab6377e717dfac9e2f78c1218dee91e8fde25454f65ab32095a949c1be5b67aa3ed1c1d9f78d0c8bc9830f5c1dc0e6e01e91effec20ead6cdd9a3f639f

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-file-l2-1-0.dll

    Filesize

    13KB

    MD5

    621a34a36c202e4c4e59a6077c22cb5e

    SHA1

    ec696fd4e8e5935a722e88a551593593a12e882e

    SHA256

    746cde47f460ab4ef45a3158cbc038b166c86b03114c259ea5c759001692c079

    SHA512

    04e94784a70a576235d5bec58c57b8b3cfc01d7b292287f299deaf52523cef51c2790874116e666e5bc672453beafe173cf1afbe49a5f3076b83344298643ae0

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-handle-l1-1-0.dll

    Filesize

    13KB

    MD5

    7141a2a1640ac67e686778130ad8dd7d

    SHA1

    8f4ba743bc5df04b3075535507983cede7ed249d

    SHA256

    4a2265e71cd5c9b85f5c705755c23323c1c33aecd9ff72b6ba1b425b8170cf08

    SHA512

    6906bcdf8474e1fc9f69457cbae6635b18ddda69e3e42ac3b2eaa26aadd717e11b4fcd14e6ed6b5c4e318705c203498d77af8717becf94fd159075093f431440

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-heap-l1-1-0.dll

    Filesize

    13KB

    MD5

    df603cd6cb0fe53fd77c065f2766b5e8

    SHA1

    0698b7b97a6f5174cdca0849bec001127f9f0b16

    SHA256

    e488e688b75b9f95451ad9c65586783e37c32b9952cb48286572c90b150ebbdd

    SHA512

    929f4868015306e5b84a1e2f341c12a792fe98d82cbcfabbbe79f932f80d81b98f1b6543da7d23e9153a68b00a3768fa9cd112382092104bd4810e3071723933

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-interlocked-l1-1-0.dll

    Filesize

    13KB

    MD5

    f438ac3307c0de580adf6fb3d4ef57f8

    SHA1

    5d10ea60e004e583940a082b9157e801aa3c4674

    SHA256

    03ccd250ed3ef09013114094068dd08c96f0763778e94523e020241f7b16312b

    SHA512

    c323aae5bb8ce58f92fb8beceb5c60f1bec12f5aaac0c1a435e38de9a10226bdb92808bb2f4e7bf069aec435cb4aade6182d541de2174b8007f8a69a8aa0d264

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-libraryloader-l1-1-0.dll

    Filesize

    14KB

    MD5

    06ec6d562b0609529e615e795f093512

    SHA1

    db7c78e4b3f8a0eb4b392c9eef5774a571719f15

    SHA256

    b120d94a585170f84230d2a6826e3f02d0eb7bde37f965c1fdaf2ba52c5d82bc

    SHA512

    10773d831d4096130305ee10d611fb28caec213dfe5dd109115c86f7c26df34d7daaea0e6b2eb9eac8f4d59421485e90d6e722c78a55132c25d7b3c7c7222ef5

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    15KB

    MD5

    2395f675152f25bdc501c1b698b3f70a

    SHA1

    829eb4dee9604330072c124b9bddf4a4e96a7c98

    SHA256

    4173e50962540ec0708930d7c456164d4e0fa96d49efb034621eb06e67ac0563

    SHA512

    7c0125e248387d268a337fa2a0090e6b8713e6205d22fb23a4ce9635fb0f5b79a0e3d28aab3050cc0445ef065632052c23341b1ac22dbd947ac4262fd63a1b51

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-memory-l1-1-0.dll

    Filesize

    13KB

    MD5

    a241d82577b25ed4aa54ab02da7d82c9

    SHA1

    6cbc888c22a104109af2f084678b15576edbe465

    SHA256

    1b72a9b95e7d62c923f6b791c4251b63e6331660caf0f44385e6eb1901a9933e

    SHA512

    e51c246b80b56ea3912e849e18dbe7ff40a4a3e189475c96c570e71e05acdf89e97ffc533810a65172fc05f742b39ee9ef90e3fa0e4c9488f839c4c82fbc8560

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-namedpipe-l1-1-0.dll

    Filesize

    13KB

    MD5

    83d560d0c8844cd047ea818414ee43ab

    SHA1

    11fd30a76f3e0a0af294a4da15890a55a0de3528

    SHA256

    93d08d10dc60968fe6df4257ad79911045aabce0d6babd9d0714abb104ac1309

    SHA512

    06a293264dca9bf12309fbc56c3d5a0f62c3bc7a04986e55c8553b778c491d78f27f9bfbd22ad2ee6317bc985b41066db6e9cbc25b93d5137ae5da012afb55c2

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-processenvironment-l1-1-0.dll

    Filesize

    14KB

    MD5

    cb39b789091823bbe8ea7c9a84343dcb

    SHA1

    4d0f56a3833abb4a52e9af6d8631ea443a407b3e

    SHA256

    3f5a60c6772417f286c89cc45fe97eeae69d1705fa65445230b71b53a0a1eee8

    SHA512

    23d393de9f9d7092f7eb79dd4aa45bca386b454caa9e91d1f09699a79b3382adc0a7b7d972fb9dc41e1e082adde8640edcef7cf444f50e4f14df93b89c823ecf

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-processthreads-l1-1-0.dll

    Filesize

    15KB

    MD5

    4039d2c04c32fa423cc6ce766f0532d9

    SHA1

    a8d0cac1bcfdc94289b2073c2a14422d929df62f

    SHA256

    979c28aab88b3a45eed546e2a857e1e9eb41cb035d78446ee668feb918227238

    SHA512

    c1a0f9920ce28d4a15e5543458f68cc64125dd1b24e7c9caad3eed2b13b8c903ca9f76c0ab82f5a688843626150d321c4353fab81697eae604acbfb920b464e5

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    13KB

    MD5

    81a255549e9b3467276810f94a67512d

    SHA1

    c3bf694f5d030d5a29ebb9ae70010be4571cec17

    SHA256

    8447c3c56f83e5a9407bf446cfc037d149b945611f03798f731e49145fca81c2

    SHA512

    05e6d83baa20b38d8710ed06c62ef8603c37d70fd0f6036f54a50ad041575d52f23c56bcebb12df8bf7cd9327c46522e59bcda47e2fcabfb0e5c11247708afa4

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-profile-l1-1-0.dll

    Filesize

    12KB

    MD5

    d3291c9be1092f7d29018e7e45eb41c8

    SHA1

    8140fa723f59675ea8292b273edbc8892cb4b5bb

    SHA256

    edf1d0a1c9175c0392be3f15a6ed0be753b6df2b303876117becf47563db6f7f

    SHA512

    bc4626df89df4aad7e2524bf515934ab3b8bd7bba50853b8c6faec65967222feadce56a2f333758cea1b7b3a93eddde2865feab453c5f3bb9bdcc5a0cd3105f5

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-rtlsupport-l1-1-0.dll

    Filesize

    13KB

    MD5

    d3167bbc7d02d30bf9e5d60abd7bb05f

    SHA1

    33a5e59103d2049140f35945b377e6ee07e06b64

    SHA256

    2c2851d20158b0023eda056c477a57853b6d648053d4d57cad49e5ed574843b4

    SHA512

    243c55b57eab36bb468a187a973e1cbbc430ad29f5ed627d3f127817885704df57a3e9865b5e28c3811bada14e1942e5293b4ff8b382ea2ba242aec82c6c51c4

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-string-l1-1-0.dll

    Filesize

    13KB

    MD5

    d5cc0ab1fe05976d71ae09911cef5a67

    SHA1

    16c7af053e6b6d128a5d9c14479b398537e1e1b0

    SHA256

    689c682fc9030ce9e228c8dea5fc981956bf78229ee8f30c5f63b2b9df813766

    SHA512

    843634364539a861eb38c5516c8c18ee00173cff5f24ad567a17430b1b53132db06a4ccd18f041972b11956a85dbdefc18ad11c9a9b3a2954e2c93113099877b

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-synch-l1-1-0.dll

    Filesize

    15KB

    MD5

    de86a7505497ecf1be8c7aa6e8b1cb8d

    SHA1

    66220266ccf36a03b36f57b1f63f2e446349fbbd

    SHA256

    493072a7a15b11c5382394e98fa0007004f90aa533373e64f109273808d5251c

    SHA512

    07e323ad892304e4052fc46f2384c94dab4bb462ac9a5a2a7b6f8a411d98639324bd06146338d66cb295e4afd30942b5bd138bcb225496774b920d51572117dc

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-synch-l1-2-0.dll

    Filesize

    13KB

    MD5

    c64289ca3db488fd15f25a8762221633

    SHA1

    b61c550bbe975b3841d8f201a967c8c227512ce4

    SHA256

    726155c1d1e1f1778bca4d3952f54ab50035b65750d69e3bdf73cf9c52213c22

    SHA512

    81f7866185b3a7971ef4cf7c98dc6326c17191c36df753b57174c6766fe0b4a49d7ab7954f08d472d0bc9dcbb3329b6309475ec092cf4a174f0b8958847aaf3c

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-sysinfo-l1-1-0.dll

    Filesize

    14KB

    MD5

    c7368f2e472ca3e428ce9793d69fa3cd

    SHA1

    8064438a9d36f6b4bae2931ffaacb512c9e52e82

    SHA256

    c5a070567d238a43818fcabe6f0a99c470f03ec54042b3c95e91a548be20bf38

    SHA512

    0303c632b61b2b51950a45df7c0de6c215e950f7845dde6b58cb0f6a9af2b74cc77d49bcf79615e9a4a15ee2b2a4fa43a4a3a0adb2005b89ab16ab00e3717e72

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    13KB

    MD5

    59f3aeb2eda80ffc000b99f27ec99d14

    SHA1

    2961c514b480424b3512d424dcd7d295477b243a

    SHA256

    e1c41c6525ed510aa75ec671f86d22a005ffd9a856a74dcf09bf3256e301a8ab

    SHA512

    ff1980c859c7a23ded484a51e596fd591df855e0266961c4620373d42190152f92df83683779a79561d46bd5d238d7d178cfa2952dee316a742a72835be44992

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-util-l1-1-0.dll

    Filesize

    13KB

    MD5

    fa11fa74380735a5b8d4b309de4854be

    SHA1

    328959db39043cf7591cb18faec351957695f788

    SHA256

    167e6e08e570e1ce34854781463c218bf14124a4112216b5f93d38d3c204e62a

    SHA512

    a82f457868374c92322f7508f2ed98504e62b670621ba17ad636044a8198f5be56be46b25426bec1b85dd79b3de7c2a00bec33bd9246bc136a208a6d6e5f335f

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-conio-l1-1-0.dll

    Filesize

    14KB

    MD5

    218334da1ed369d2b694d3dff42da6ce

    SHA1

    afcb936ebfc7a2d6cd3b0c7f25a3fb125bcb8a8a

    SHA256

    b6ff4feabbe5f1fdc56f2e4e440dd8258702c3fc2a314440100319a62304baff

    SHA512

    9f2d009935b0847f89639b80c79dbe0fdfd08aa0c958ff67665a90971d3b304edf0e87b99112ca3ce988c2065147a41b63f47cd107d3a02e1a164ceb9bc4c13d

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-convert-l1-1-0.dll

    Filesize

    17KB

    MD5

    d360a829d5376ff0961f62bbe5ac9e06

    SHA1

    7965077b47bf9949570656df5160f55d27eed1a4

    SHA256

    6db47157030960e7106cec7825601ce7a33ea58ece603c90ecd9532ece1d1afe

    SHA512

    aaeed59b187bb277239a07e539e34520e8bc321e4f398e44ee396751e76c189c0180171202380974f12c1c302e77b533b7a93898dd8ddfd5c524143a22b3b748

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-environment-l1-1-0.dll

    Filesize

    13KB

    MD5

    0ed33abfad3cedf07f538e2152443683

    SHA1

    78eed147eb33efd14f03d8e2fbe0ec0f41ae4056

    SHA256

    f76d2547bfc429e14b49d030679fdefa12383c1f3a8e09fa69b760a89f469e9a

    SHA512

    42b9417b464f6ddd45294e85b3f9143e5c76f512ca70214d1fc302f0cd28c8b7c29d9e213c78861d10ef4316aa02c14ecec2d9bc5a8021880f4186798eb4e317

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-filesystem-l1-1-0.dll

    Filesize

    15KB

    MD5

    442a686b00c22cc9affcecb15a569267

    SHA1

    10f02b15493737d30aacebad19ecadb8bab81817

    SHA256

    cb0be4a28ff15650353aa3ea778e7b4076f77d394b6c406b2d288a8ccdf88a05

    SHA512

    3d1da7ce726a435629d492ee2191e9818ddc975fc686835d61f1259fbb123de522f419a4571fb24c2c5227a2d12a83db2815aca6b7360a75a4b0671ea212acbd

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-heap-l1-1-0.dll

    Filesize

    14KB

    MD5

    dd79fe03815d8d96a70955257b85d025

    SHA1

    d98f5a2d2d52fc361064427fdecffbe1620b1d68

    SHA256

    505b61565d51d0c95d9bc77337d063cd18c97a575f5e318cc5a0458d10ef4638

    SHA512

    3fa3d9a9cddb493786c557f0738c6fad181a862749447c8172093709c4e931708cce12c9d177dbc4f9a0de0f950ebeaf02271e7cbc2b1f177e9c7f838b9ad7d0

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-locale-l1-1-0.dll

    Filesize

    13KB

    MD5

    ed7e63157d241abb713998265b3987d1

    SHA1

    00d80cfe269434a4bbc7b2266e0e3d7f7ff72f2f

    SHA256

    3afe87a1dd2463fc3a9b5ba0bfc97fb3689764ac10d2c408f5a7b7d6caf06657

    SHA512

    3e89d1c1c3fca451a3d693873ebf58cceb73720c4c56d7449a96192fd240ac285a3da4e200ec289bfd5cfcfbdac4d83671059ed672739ca83deef9c891d84165

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-math-l1-1-0.dll

    Filesize

    22KB

    MD5

    0d517e23b98b6e465214a25b0e73a49b

    SHA1

    8900d523d919a42ef4750eee7ce87cfb835fa455

    SHA256

    90d5f4615e9aadf8f38f98a8443ca3cdcee6f082d07ee2abd1a74204dbefe73a

    SHA512

    d850881bd7b042051fecee9e2fb4be105184e678c82d25095f88dc3c4e6ca9eb4ef818eee36443a62a1f54225a5213363b5a058d3a70baa29dd83f44dc9a1eb4

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-process-l1-1-0.dll

    Filesize

    14KB

    MD5

    e9208bf204cc2f705533328fa24f3a8b

    SHA1

    d2d6549d7a85dfb4d5877c59f3ba110985a202c9

    SHA256

    c679988b7dac986ec8d92b994d92b9979e565f6adbfd356b66a920f20e9caa86

    SHA512

    fb648540545c25d15a19cb9605fd78cbb5a214ff4d91d925400632aca85b59611493db71c65182cc189529fe767bcee114ac7e6c7980afa64875ca622ff1b038

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-runtime-l1-1-0.dll

    Filesize

    17KB

    MD5

    9206d6bb749266ac31da559029003fbb

    SHA1

    496d3051b66d93951253686b73023b64350b521b

    SHA256

    19da9d0027faed99ef3685a706da4256a24bc705e1f3c0dfcb89df0508620814

    SHA512

    cd316a52b289e223f607a88033efe1de085a1fba3228a55900ef5908bd90c6342930bdfb73a1ae995c5e496977336186bb3c4e1a0f4f3de52a6465014ee917bf

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-stdio-l1-1-0.dll

    Filesize

    19KB

    MD5

    7f21f2ae857b6ed53ba086feca60e4d9

    SHA1

    abf957cf28b85c48a86ae255c36a978b4f1e0744

    SHA256

    479e452662de08c4f65572d78ad553d8a9ce0612e39e3b2aa274b77b40b398f2

    SHA512

    1a2d46806b48cf91beb7dcc9219af80f02d622b1aa9af7785e6b92dca138781a04a3c1bcc15f166fff96ee6bf3be19ae63e32b74a57d0f281acc1685fbca8148

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-string-l1-1-0.dll

    Filesize

    19KB

    MD5

    017cd4317c9ff229fe723b4cef459e06

    SHA1

    d4355b4257d2efd5b1fc1a8b1ec8fbcde2260c75

    SHA256

    9800d19f55385efdb4bb215d7de0773fb9574fd5ce2773f0217973c780bb8ccf

    SHA512

    513e20936e54e179772669a5c097e61369e6b9e62b7a8c246e4bb518a190078968b6aa8c434418eae739b2081421faec4e396ae21803d383e853c77c8b914dc7

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-time-l1-1-0.dll

    Filesize

    15KB

    MD5

    7e767ac571d63bcaeb64e243b2600b8d

    SHA1

    995ce687f655ff937fdf80c1ac7bae043e23e45a

    SHA256

    c7643c68c3a33a2f67edca02d713749cafeb200daf1f3db7bd2eb168809132ab

    SHA512

    10b0f0c4844b4beef38d9bd51bbde19ff83caa8e9ac2673528056535872b07e48515c973c50dea9da0ac335cf1a98374d31f52cb04bb0e95eb0e5e6337eee95e

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-crt-utility-l1-1-0.dll

    Filesize

    13KB

    MD5

    3138b144c99759b77dbd488dc91134ae

    SHA1

    664718852f84ad49623ffd401fac7959eda57704

    SHA256

    3f78ca473da2335c8f26e32ac5a12ab6a76e4c415d923a930abbc0ef5630c835

    SHA512

    4e5c519facb1580eca906821d0956b750c63f8882acd5dd0be1531ee2ee45e8b0fb10de6db0f1cd254844131680e19206942d7be24e976bd34cf1ebfa434b16b

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\base_library.zip

    Filesize

    1.3MB

    MD5

    43935f81d0c08e8ab1dfe88d65af86d8

    SHA1

    abb6eae98264ee4209b81996c956a010ecf9159b

    SHA256

    c611943f0aeb3292d049437cb03500cc2f8d12f23faf55e644bca82f43679bc0

    SHA512

    06a9dcd310aa538664b08f817ec1c6cfa3f748810d76559c46878ea90796804904d41ac79535c7f63114df34c0e5de6d0452bb30df54b77118d925f21cfa1955

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\libcrypto-3.dll

    Filesize

    5.0MB

    MD5

    e547cf6d296a88f5b1c352c116df7c0c

    SHA1

    cafa14e0367f7c13ad140fd556f10f320a039783

    SHA256

    05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de

    SHA512

    9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\libffi-8.dll

    Filesize

    38KB

    MD5

    0f8e4992ca92baaf54cc0b43aaccce21

    SHA1

    c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

    SHA256

    eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

    SHA512

    6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\libssl-3.dll

    Filesize

    768KB

    MD5

    19a2aba25456181d5fb572d88ac0e73e

    SHA1

    656ca8cdfc9c3a6379536e2027e93408851483db

    SHA256

    2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006

    SHA512

    df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\pyexpat.pyd

    Filesize

    197KB

    MD5

    958231414cc697b3c59a491cc79404a7

    SHA1

    3dec86b90543ea439e145d7426a91a7aca1eaab6

    SHA256

    efd6099b1a6efdadd988d08dce0d8a34bd838106238250bccd201dc7dcd9387f

    SHA512

    fd29d0aab59485340b68dc4552b9e059ffb705d4a64ff9963e1ee8a69d9d96593848d07be70528d1beb02bbbbd69793ee3ea764e43b33879f5c304d8a912c3be

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\python312.dll

    Filesize

    6.6MB

    MD5

    d521654d889666a0bc753320f071ef60

    SHA1

    5fd9b90c5d0527e53c199f94bad540c1e0985db6

    SHA256

    21700f0bad5769a1b61ea408dc0a140ffd0a356a774c6eb0cc70e574b929d2e2

    SHA512

    7a726835423a36de80fb29ef65dfe7150bd1567cac6f3569e24d9fe091496c807556d0150456429a3d1a6fd2ed0b8ae3128ea3b8674c97f42ce7c897719d2cd3

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\select.pyd

    Filesize

    30KB

    MD5

    d0cc9fc9a0650ba00bd206720223493b

    SHA1

    295bc204e489572b74cc11801ed8590f808e1618

    SHA256

    411d6f538bdbaf60f1a1798fa8aa7ed3a4e8fcc99c9f9f10d21270d2f3742019

    SHA512

    d3ebcb91d1b8aa247d50c2c4b2ba1bf3102317c593cbf6c63883e8bf9d6e50c0a40f149654797abc5b4f17aee282ddd972a8cd9189bfcd5b9cec5ab9c341e20b

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\tcl86t.dll

    Filesize

    1.7MB

    MD5

    108d97000657e7b1b95626350784ed23

    SHA1

    3814e6e5356b26e6e538f2c1803418eb83941e30

    SHA256

    3d2769e69d611314d517fc9aad688a529670af94a7589f728107180ae105218f

    SHA512

    9475cd1c8fe2e769ed0e8469d1f19cdf808f930cccc3baf581888a705f195c9be02652168d9c1c25ba850502f94e7eb87687c2c75f0f699c38309bc92b9004a0

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\tk86t.dll

    Filesize

    1.5MB

    MD5

    4cdd92e60eb291053d2ad12bf0710749

    SHA1

    31424e8d35459ba43672f05abba1e37c23f74536

    SHA256

    b30576b60aee548838243601952a05b70a9fc937f5a607f6b1413cd5ed04d900

    SHA512

    80c3bb58817578708e14ba173bfbe8f62fb54efa22feb8ff08b9eefa4462b74062654f956f965c7caa8aa16295229b58ef9eea8d2c4c94652bde1e61038e6ffe

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\ucrtbase.dll

    Filesize

    987KB

    MD5

    637c17ad8bccc838b0cf83ffb8e2c7fd

    SHA1

    b2dd2890668e589badb2ba61a27c1da503d73c39

    SHA256

    be7368df484688493fb49fb0c4ad641485070190db62a2c071c9c50612e43fed

    SHA512

    f6b727c319ca2e85a9b5c5e0b9d8b9023f0cf4193fab983cfa26060923374c6abd6d11db1da2e524a8b04622a4e13beb4c48dc23f98886d4abb33eb09f3a0776

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    cc8142bedafdfaa50b26c6d07755c7a6

    SHA1

    0fcab5816eaf7b138f22c29c6d5b5f59551b39fe

    SHA256

    bc2cf23b7b7491edcf03103b78dbaf42afd84a60ea71e764af9a1ddd0fe84268

    SHA512

    c3b0c1dbe5bf159ab7706f314a75a856a08ebb889f53fe22ab3ec92b35b5e211edab3934df3da64ebea76f38eb9bfc9504db8d7546a36bc3cabe40c5599a9cbd

  • C:\Users\Admin\AppData\Local\Temp\_MEI7642\zlib1.dll

    Filesize

    143KB

    MD5

    fa87d95aa4f9348d3f3b75d62a23658d

    SHA1

    b8829e2ec83b1950ae013be60ed3e7616ce2ed80

    SHA256

    21feea753a6f991f01bcf9d30afada06eca3a105e97d5d81998ef359c4fc86a3

    SHA512

    cb965cfc905b7c588bd2009d4915973a004de658b6153de9fe2ae8b27c5612b56de14b95499ec050b70d16f89f0313cd81a3afa827a30c38aa206e44c11ef283

  • C:\Users\Admin\Desktop\settings.json

    Filesize

    262B

    MD5

    33bff97d5a7015e5edba09bfffab3b7a

    SHA1

    ea7373991bced93a172966c1923a100365375984

    SHA256

    d5cd543644b779e8d92bcdcd82bb08425028b717b0da29fd352249a57f7c38ae

    SHA512

    49dad01b396564060c7cb25c42129775d459183a0fa37fafaa1b5c3c28e91f4c52c783bceb18fe3e453bb7d1442ce5330fc807edf0b6998a64cc23d30c099a5f

  • C:\Users\Admin\Desktop\sfb.exe

    Filesize

    16.3MB

    MD5

    c2e91e18caf71547076f5c060f0994a8

    SHA1

    cf6c07f81d1f38e5cfb70615bedb8e7c7d41947d

    SHA256

    beb9a98df0d88653ba149728d157a519df367a2015fd2d120daeef988027ba6f

    SHA512

    41b91bb982b6be556435896b341a79dfbc12dce595d4460bf5c702ddf1ec22e0337515d84f90fb7ec2b78df052e327b044461ac17decc3951f2dd5f256fbfa27

  • memory/432-4901-0x00007FF82C090000-0x00007FF82C0BA000-memory.dmp

    Filesize

    168KB

  • memory/1760-48-0x0000000001190000-0x000000000119C000-memory.dmp

    Filesize

    48KB

  • memory/1760-2-0x00007FF81EDB0000-0x00007FF81F871000-memory.dmp

    Filesize

    10.8MB

  • memory/1760-45-0x000000001C6C0000-0x000000001C6E2000-memory.dmp

    Filesize

    136KB

  • memory/1760-6-0x000000001D160000-0x000000001D27E000-memory.dmp

    Filesize

    1.1MB

  • memory/1760-5-0x000000001CE10000-0x000000001D160000-memory.dmp

    Filesize

    3.3MB

  • memory/1760-4-0x00007FF81EDB0000-0x00007FF81F871000-memory.dmp

    Filesize

    10.8MB

  • memory/1760-3-0x00007FF81EDB3000-0x00007FF81EDB5000-memory.dmp

    Filesize

    8KB

  • memory/1760-46-0x000000001CC10000-0x000000001CCC0000-memory.dmp

    Filesize

    704KB

  • memory/1760-4907-0x00007FF81EDB0000-0x00007FF81F871000-memory.dmp

    Filesize

    10.8MB

  • memory/1760-0-0x00007FF81EDB3000-0x00007FF81EDB5000-memory.dmp

    Filesize

    8KB

  • memory/1760-47-0x000000001E1B0000-0x000000001E6D8000-memory.dmp

    Filesize

    5.2MB

  • memory/1760-1-0x0000000000890000-0x00000000008A2000-memory.dmp

    Filesize

    72KB

  • memory/2116-1117-0x00007FF82E630000-0x00007FF82E65A000-memory.dmp

    Filesize

    168KB

  • memory/2116-1114-0x00007FF82E630000-0x00007FF82E65A000-memory.dmp

    Filesize

    168KB

  • memory/4644-3013-0x00007FF82E940000-0x00007FF82E96A000-memory.dmp

    Filesize

    168KB

  • memory/4644-3000-0x00007FF82E940000-0x00007FF82E96A000-memory.dmp

    Filesize

    168KB