Malware Analysis Report

2024-12-07 19:22

Sample ID 241114-kxy72awhlm
Target b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9
SHA256 b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9
Tags
persistence redline diamotrix credential_access discovery infostealer pyinstaller spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9

Threat Level: Known bad

The file b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9 was found to be: Known bad.

Malicious Activity Summary

persistence redline diamotrix credential_access discovery infostealer pyinstaller spyware stealer

RedLine

Redline family

RedLine payload

Drops file in Drivers directory

Downloads MZ/PE file

Credentials from Password Stores: Windows Credential Manager

Executes dropped EXE

Drops startup file

Loads dropped DLL

Reads user/profile data of web browsers

Accesses cryptocurrency files/wallets, possible credential harvesting

Adds Run key to start application

Checks installed software on the system

Suspicious use of SetThreadContext

Enumerates physical storage devices

Detects Pyinstaller

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of UnmapMainImage

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-14 08:59

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-14 08:59

Reported

2024-11-14 09:02

Platform

win7-20240903-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\system32\svchost.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chrome.lnk C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\FAF27FEB3947465854224\\FAF27FEB3947465854224.exe" C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2096 set thread context of 2452 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe C:\Windows\system32\svchost.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe

"C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2452 -s 224

Network

N/A

Files

\Users\Admin\AppData\Roaming\FAF27FEB3947465854224\FAF27FEB3947465854224.exe

MD5 5523f28f2224dde8d74286b09146bb47
SHA1 6bb034d638fcb055bf59afa3e93ac8dce25a3cf5
SHA256 b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9
SHA512 1d5b06d513befaae50e34493b0daa197fb9e4adb876db99aa1766026dad8e6004b24659de71763be47a31b1049c394b0876a7d3846d7827d2c0584deffdab1d0

memory/2452-7-0x000007FFFFFD9000-0x000007FFFFFDA000-memory.dmp

C:\Windows\System32\drivers\etc\hosts

MD5 c55e7b590134bae106d2d8170affe162
SHA1 13b61495d4b1460ecb770e42a923c880a73ad692
SHA256 5d4c55ac6c8371c79f94a81c1e53fa50b0fa4231cda0fc9d93892739c723c7e7
SHA512 99162c8512811021c31c98cffe306b3badd07e779ac73d6da16e16d7597c1c8112b1a78dc33a27f717b13333bedf6a804a757e5030f653aeea41a338492c9e27

memory/2452-58-0x0000000140000000-0x000000014004A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-14 08:59

Reported

2024-11-14 09:02

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

140s

Command Line

C:\Windows\Explorer.EXE

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Downloads MZ/PE file

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\system32\svchost.exe N/A

Credentials from Password Stores: Windows Credential Manager

credential_access stealer

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chrome.lnk C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\516390BED302243083857\\516390BED302243083857.exe" C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A

Checks installed software on the system

discovery

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4256 set thread context of 1964 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe C:\Windows\system32\svchost.exe

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\B93F.tmp.x.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A
N/A N/A C:\Windows\system32\svchost.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\B93F.tmp.x.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4256 wrote to memory of 1964 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe C:\Windows\system32\svchost.exe
PID 4256 wrote to memory of 1964 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe C:\Windows\system32\svchost.exe
PID 4256 wrote to memory of 1964 N/A C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe C:\Windows\system32\svchost.exe
PID 1964 wrote to memory of 3468 N/A C:\Windows\system32\svchost.exe C:\Windows\Explorer.EXE
PID 3468 wrote to memory of 3560 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe
PID 3468 wrote to memory of 3560 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe
PID 3560 wrote to memory of 3644 N/A C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe
PID 3560 wrote to memory of 3644 N/A C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe
PID 3468 wrote to memory of 2212 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\B93F.tmp.x.exe
PID 3468 wrote to memory of 2212 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\B93F.tmp.x.exe
PID 3468 wrote to memory of 2212 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\B93F.tmp.x.exe

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe

"C:\Users\Admin\AppData\Local\Temp\b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM

C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe

"C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe"

C:\Users\Admin\AppData\Local\Temp\B93F.tmp.x.exe

"C:\Users\Admin\AppData\Local\Temp\B93F.tmp.x.exe"

C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe

"C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe"

Network

Country Destination Domain Proto
RU 176.111.174.140:80 176.111.174.140 tcp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
RU 176.111.174.140:80 176.111.174.140 tcp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 140.174.111.176.in-addr.arpa udp
RU 176.111.174.140:80 176.111.174.140 tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
RU 176.111.174.140:80 176.111.174.140 tcp
RU 176.111.174.140:80 176.111.174.140 tcp
RU 176.111.174.140:80 176.111.174.140 tcp
RU 176.111.174.140:80 176.111.174.140 tcp
RU 176.111.174.140:80 176.111.174.140 tcp
RU 176.111.174.140:1912 tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 133.130.81.91.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
RU 176.111.174.140:80 176.111.174.140 tcp

Files

C:\Users\Admin\AppData\Roaming\516390BED302243083857\516390BED302243083857.exe

MD5 5523f28f2224dde8d74286b09146bb47
SHA1 6bb034d638fcb055bf59afa3e93ac8dce25a3cf5
SHA256 b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9
SHA512 1d5b06d513befaae50e34493b0daa197fb9e4adb876db99aa1766026dad8e6004b24659de71763be47a31b1049c394b0876a7d3846d7827d2c0584deffdab1d0

C:\Windows\System32\drivers\etc\hosts

MD5 7aed163a7c554d2c86de68d11a55d030
SHA1 8416928fbe1aa0ab181a6d6abe1e30ef82ea25ea
SHA256 b5f1a672f239b65afa1f8e8a0b7da5f793e9ff6f3f8aff2818c6c635f0b360b9
SHA512 6dc00db724ce2567754a79fc3f5e0e2133abad323ced5beed053fd51f93227c3e263e008ada5f853cf47a27080a66ef921c2c210be7386d589383fcb984b3cfd

memory/3468-57-0x0000000002BF0000-0x0000000002C2E000-memory.dmp

memory/3468-59-0x0000000002C30000-0x0000000002C72000-memory.dmp

memory/3468-65-0x0000000008330000-0x0000000008383000-memory.dmp

memory/3468-71-0x0000000002C30000-0x0000000002C72000-memory.dmp

memory/3468-72-0x00000000080A0000-0x000000000819E000-memory.dmp

C:\Users\Admin\AppData\Local\E838C7E8D26A1343594171\System_info.txt

MD5 a99562b08cc0b6ada5d031cc29eea485
SHA1 6fc7634551cb3f083a3a1d18770b71a58615602e
SHA256 34fd64cf0230e5af2062939ed120e20b01ab77b281f3bdc9ebcdcaf735f33497
SHA512 9acea975bff38ea955582f061315d9284c927b8fe3a0244481ffb848897af8e9fb58c449164b84adaf8cf23496e0fb764cc65b96d603eac2f299dc05bb5fa739

memory/3468-68-0x0000000008330000-0x0000000008383000-memory.dmp

memory/3468-69-0x00000000080A0000-0x000000000819E000-memory.dmp

memory/3468-64-0x00000000086B0000-0x00000000087A9000-memory.dmp

memory/3468-63-0x00000000082D0000-0x0000000008316000-memory.dmp

memory/3468-61-0x0000000002C30000-0x0000000002C72000-memory.dmp

C:\Users\Admin\AppData\Local\E838C7E8D26A1343594171\File_Grabber\0.2.filtertrie.intermediate.txt

MD5 c204e9faaf8565ad333828beff2d786e
SHA1 7d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1
SHA256 d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f
SHA512 e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8

C:\Users\Admin\AppData\Local\E838C7E8D26A1343594171\File_Grabber\0.1.filtertrie.intermediate.txt

MD5 34bd1dfb9f72cf4f86e6df6da0a9e49a
SHA1 5f96d66f33c81c0b10df2128d3860e3cb7e89563
SHA256 8e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c
SHA512 e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96

memory/3468-184-0x00000000080A0000-0x000000000819E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\B621.tmp.zx.exe

MD5 56378523b35cf8ccf01b7dfd0a7893ab
SHA1 ab9be30874a86ecb840bad21ca89840ed61b9c52
SHA256 ddb9ac7733ce2526159ac300526b41acfe437b45c73a404fc29a29ab2f0a183f
SHA512 ff32919ce3c9e074caf16e557e46d517b0e9fa15b71e01ef771cc66e369330a08bca8f7e94f7013bcac1db9482a5acb11ac152d7739e282efbe32764dd148d82

memory/3468-190-0x00007FF970AA0000-0x00007FF970AA1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\B93F.tmp.x.exe

MD5 97eb7baa28471ec31e5373fcd7b8c880
SHA1 397efcd2fae0589e9e29fc2153ffb18a86a9b709
SHA256 9053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb
SHA512 323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced

C:\Users\Admin\AppData\Local\Temp\_MEI35602\ucrtbase.dll

MD5 4e326feeb3ebf1e3eb21eeb224345727
SHA1 f156a272dbc6695cc170b6091ef8cd41db7ba040
SHA256 3c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9
SHA512 be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67

C:\Users\Admin\AppData\Local\Temp\_MEI35602\python38.dll

MD5 d2a8a5e7380d5f4716016777818a32c5
SHA1 fb12f31d1d0758fe3e056875461186056121ed0c
SHA256 59ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9
SHA512 ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7

C:\Users\Admin\AppData\Local\Temp\_MEI35602\VCRUNTIME140.dll

MD5 0e675d4a7a5b7ccd69013386793f68eb
SHA1 6e5821ddd8fea6681bda4448816f39984a33596b
SHA256 bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512 cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

C:\Users\Admin\AppData\Local\Temp\_MEI35602\_ctypes.pyd

MD5 f1e33a8f6f91c2ed93dc5049dd50d7b8
SHA1 23c583dc98aa3f6b8b108db5d90e65d3dd72e9b4
SHA256 9459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4
SHA512 229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5

C:\Users\Admin\AppData\Local\Temp\_MEI35602\libcrypto-1_1.dll

MD5 bf83f8ad60cb9db462ce62c73208a30d
SHA1 f1bc7dbc1e5b00426a51878719196d78981674c4
SHA256 012866b68f458ec204b9bce067af8f4a488860774e7e17973c49e583b52b828d
SHA512 ae1bdda1c174ddf4205ab19a25737fe523dca6a9a339030cd8a95674c243d0011121067c007be56def4eaeffc40cbdadfdcbd1e61df3404d6a3921d196dcd81e

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-utility-l1-1-0.dll

MD5 fe1096f1ade3342f049921928327f553
SHA1 118fb451ab006cc55f715cdf3b5e0c49cf42fbe0
SHA256 88d3918e2f063553cee283306365aa8701e60fb418f37763b4719f9974f07477
SHA512 0a982046f0c93f68c03a9dd48f2bc7aee68b9eebeaea01c3566b2384d0b8a231570e232168d4608a09136bcb2b1489af802fd0c25348f743f0c1c8955edd41c1

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-time-l1-1-0.dll

MD5 2fd0da47811b8ed4a0abdf9030419381
SHA1 46e3f21a9bd31013a804ba45dc90cc22331a60d1
SHA256 de81c4d37833380a1c71a5401de3ab4fe1f8856fc40d46d0165719a81d7f3924
SHA512 2e6f900628809bfd908590fe1ea38e0e36960235f9a6bbccb73bbb95c71bfd10f75e1df5e8cf93a682e4ada962b06c278afc9123ab5a4117f77d1686ff683d6f

memory/2212-307-0x0000000000D30000-0x0000000000D82000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-string-l1-1-0.dll

MD5 f22faca49e4d5d80ec26ed31e7ecd0e0
SHA1 473bcbfb78e6a63afd720b5cbe5c55d9495a3d88
SHA256 1eb30ea95dae91054a33a12b1c73601518d28e3746db552d7ce120da589d4cf4
SHA512 c8090758435f02e3659d303211d78102c71754ba12b0a7e25083fd3529b3894dc3ab200b02a2899418cc6ed3b8f483d36e6c2bf86ce2a34e5fd9ad0483b73040

memory/2212-308-0x0000000005E30000-0x00000000063D4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-stdio-l1-1-0.dll

MD5 120a5dc2682cd2a838e0fc0efd45506e
SHA1 8710be5d5e9c878669ff8b25b67fb2deb32cd77a
SHA256 c14f0d929a761a4505628c4eb5754d81b88aa1fdad2154a2f2b0215b983b6d89
SHA512 4330edf9b84c541e5ed3bb672548f35efa75c6b257c3215fc29ba6e152294820347517ec9bd6bde38411efa9074324a276cf0d7d905ed5dd88e906d78780760c

memory/2212-309-0x0000000005770000-0x0000000005802000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-runtime-l1-1-0.dll

MD5 21b509d048418922b92985696710afca
SHA1 c499dd098aab8c7e05b8b0fd55f994472d527203
SHA256 fe7336d2fb3b13a00b5b4ce055a84f0957daefdace94f21b88e692e54b678ac3
SHA512 c517b02d4e94cf8360d98fd093bca25e8ae303c1b4500cf4cf01f78a7d7ef5f581b99a0371f438c6805a0b3040a0e06994ba7b541213819bd07ec8c6251cb9bb

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-process-l1-1-0.dll

MD5 54a8fca040976f2aac779a344b275c80
SHA1 ea1f01d6dcdf688eb0f21a8cb8a38f03bc777883
SHA256 7e90e7acc69aca4591ce421c302c7f6cdf8e44f3b4390f66ec43dff456ffea29
SHA512 cb20bed4972e56f74de1b7bc50dc1e27f2422dbb302aecb749018b9f88e3e4a67c9fc69bbbb8c4b21d49a530cc8266172e7d237650512aafb293cdfe06d02228

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-math-l1-1-0.dll

MD5 487f72d0cf7dc1d85fa18788a1b46813
SHA1 0aabff6d4ee9a2a56d40ee61e4591d4ba7d14c0d
SHA256 560baf1b87b692c284ccbb82f2458a688757231b315b6875482e08c8f5333b3d
SHA512 b7f4e32f98bfdcf799331253faebb1fb08ec24f638d8526f02a6d9371c8490b27d03db3412128ced6d2bbb11604247f3f22c8380b1bf2a11fb3bb92f18980185

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-locale-l1-1-0.dll

MD5 d51bc845c4efbfdbd68e8ccffdad7375
SHA1 c82e580ec68c48e613c63a4c2f9974bb59182cf6
SHA256 89d9f54e6c9ae1cb8f914da1a2993a20de588c18f1aaf4d66efb20c3a282c866
SHA512 2e353cf58ad218c3e068a345d1da6743f488789ef7c6b96492d48571dc64df8a71ad2db2e5976cfd04cf4b55455e99c70c7f32bd2c0f4a8bed1d29c2dafc17b0

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-heap-l1-1-0.dll

MD5 43bf2037bfd3fb60e1fedac634c6f86e
SHA1 959eebe41d905ad3afa4254a52628ec13613cf70
SHA256 735703c0597da278af8a6359fc051b9e657627f50ad5b486185c2ef328ad571b
SHA512 7042846c009efea45ca5fafdc08016eca471a8c54486ba03f212abba47467f8744e9546c8f33214620f97dbcc994e3002788ad0db65b86d8a3e4ff0d8a9d0d05

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 633dca52da4ebaa6f4bf268822c6dc88
SHA1 1ebfc0f881ce338d2f66fcc3f9c1cbb94cdc067e
SHA256 424fd5d3d3297a8ab1227007ef8ded5a4f194f24bd573a5211be71937aa55d22
SHA512 ed058525ee7b4cc7e12561c7d674c26759a4301322ff0b3239f3183911ce14993614e3199d8017b9bfde25c8cb9ac0990d318bb19f3992624b39ec0f084a8df1

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-environment-l1-1-0.dll

MD5 33a0fe1943c5a325f93679d6e9237fee
SHA1 737d2537d602308fc022dbc0c29aa607bcdec702
SHA256 5af7aa065ffdbf98d139246e198601bfde025d11a6c878201f4b99876d6c7eac
SHA512 cab7fcaa305a9ace1f1cc7077b97526bebc0921adf23273e74cd42d7fe99401d4f7ede8ecb9847b6734a13760b9ebe4dbd2465a3db3139ed232dbef68fb62c54

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-convert-l1-1-0.dll

MD5 da5e087677c8ebbc0062eac758dfed49
SHA1 ca69d48efa07090acb7ae7c1608f61e8d26d3985
SHA256 08a43a53a66d8acb2e107e6fc71213cedd180363055a2dc5081fe5a837940dce
SHA512 6262e9a0808d8f64e5f2dfad5242cd307e2f5eaa78f0a768f325e65c98db056c312d79f0b3e63c74e364af913a832c1d90f4604fe26cc5fb05f3a5a661b12573

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-crt-conio-l1-1-0.dll

MD5 22bfe210b767a667b0f3ed692a536e4e
SHA1 88e0ff9c141d8484b5e34eaaa5e4be0b414b8adf
SHA256 f1a2499cc238e52d69c63a43d1e61847cf852173fe95c155056cfbd2cb76abc3
SHA512 cbea3c690049a73b1a713a2183ff15d13b09982f8dd128546fd3db264af4252ccd390021dee54435f06827450da4bd388bd6ff11b084c0b43d50b181c928fd25

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-util-l1-1-0.dll

MD5 edd61ff85d75794dc92877f793a2cef6
SHA1 de9f1738fc8bf2d19aa202e34512ec24c1ccb635
SHA256 8aca888849e9089a3a56fa867b16b071951693ab886843cfb61bd7a5b08a1ece
SHA512 6cef9b256cdca1a401971ca5706adf395961b2d3407c1fff23e6c16f7e2ce6d85d946843a53532848fcc087c18009c08f651c6eb38112778a2b4b33e8c64796c

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-timezone-l1-1-0.dll

MD5 eab486e4719b916cad05d64cd4e72e43
SHA1 876c256fb2aeb0b25a63c9ee87d79b7a3c157ead
SHA256 05fe96faa8429992520451f4317fbceba1b17716fa2caf44ddc92ede88ce509d
SHA512 c50c3e656cc28a2f4f6377ba24d126bdc248a3125dca490994f8cace0a4903e23346ae937bb5b0a333f7d39ece42665ae44fde2fd5600873489f3982151a0f5d

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 8aea681e0e2b9abbf73a924003247dbb
SHA1 5bafc2e0a3906723f9b12834b054e6f44d7ff49f
SHA256 286068a999fe179ee91b289360dd76e89365900b130a50e8651a9b7ece80b36d
SHA512 08c83a729036c94148d9a5cbc03647fa2adea4fba1bbb514c06f85ca804eefbf36c909cb6edc1171da8d4d5e4389e15e52571baa6987d1f1353377f509e269ab

memory/2212-310-0x0000000005840000-0x000000000584A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-synch-l1-2-0.dll

MD5 b751571148923d943f828a1deb459e24
SHA1 d4160404c2aa6aeaf3492738f5a6ce476a0584a6
SHA256 b394b1142d060322048fb6a8ac6281e4576c0e37be8da772bc970f352dd22a20
SHA512 26e252ff0c01e1e398ebddcc5683a58cdd139161f2b63b65bde6c3e943e85c0820b24486859c2c597af6189de38ca7fe6fa700975be0650cb53c791cd2481c9d

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-synch-l1-1-0.dll

MD5 b98598657162de8fbc1536568f1e5a4f
SHA1 f7c020220025101638fd690d86c53d895a03e53c
SHA256 f596c72be43db3a722b7c7a0fd3a4d5aea68267003986fbfd278702af88efa74
SHA512 ad5f46a3f4f6e64a5dcb85c328f1b8daefa94fc33f59922328fdcfedc04a8759f16a1a839027f74b7d7016406c20ac47569277620d6b909e09999021b669a0d6

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-string-l1-1-0.dll

MD5 bcb412464f01467f1066e94085957f42
SHA1 716c11b5d759d59dbfec116874e382d69f9a25b6
SHA256 f040b6e07935b67599ea7e32859a3e93db37ff4195b28b4451ad0d274db6330e
SHA512 79ec0c5ee21680843c8b7f22da3155b7607d5be269f8a51056cc5f060ad3a48ced3b6829117262aba1a90e692374b59ddfe92105d14179f631efc0c863bfdecb

C:\Users\Admin\AppData\Local\Temp\_MEI35602\_socket.pyd

MD5 d6bae4b430f349ab42553dc738699f0e
SHA1 7e5efc958e189c117eccef39ec16ebf00e7645a9
SHA256 587c4f3092b5f3e34f6b1e927ecc7127b3fe2f7fa84e8a3d0c41828583bd5cef
SHA512 a8f8fed5ea88e8177e291b708e44b763d105907e9f8c9e046c4eebb8684a1778383d1fba6a5fa863ca37c42fd58ed977e9bb3a6b12c5b8d9ab6ef44de75e3d1e

C:\Users\Admin\AppData\Local\Temp\_MEI35602\_lzma.pyd

MD5 37057c92f50391d0751f2c1d7ad25b02
SHA1 a43c6835b11621663fa251da421be58d143d2afb
SHA256 9442dc46829485670a6ac0c02ef83c54b401f1570d1d5d1d85c19c1587487764
SHA512 953dc856ad00c3aec6aeab3afa2deb24211b5b791c184598a2573b444761db2d4d770b8b807ebba00ee18725ff83157ec5fa2e3591a7756eb718eba282491c7c

C:\Users\Admin\AppData\Local\Temp\_MEI35602\_hashlib.pyd

MD5 a6448bc5e5da21a222de164823add45c
SHA1 6c26eb949d7eb97d19e42559b2e3713d7629f2f9
SHA256 3692fc8e70e6e29910032240080fc8109248ce9a996f0a70d69acf1542fca69a
SHA512 a3833c7e1cf0e4d181ac4de95c5dfa685cf528dc39010bf0ac82864953106213eccff70785021ccb05395b5cf0dcb89404394327cd7e69f820d14dfa6fba8cba

C:\Users\Admin\AppData\Local\Temp\_MEI35602\_bz2.pyd

MD5 3dc8af67e6ee06af9eec52fe985a7633
SHA1 1451b8c598348a0c0e50afc0ec91513c46fe3af6
SHA256 c55821f5fdb0064c796b2c0b03b51971f073140bc210cbe6ed90387db2bed929
SHA512 da16bfbc66c8abc078278d4d3ce1595a54c9ef43ae8837ceb35ae2f4757b930fe55e258827036eba8218315c10af5928e30cb22c60ff69159c8fe76327280087

C:\Users\Admin\AppData\Local\Temp\_MEI35602\unicodedata.pyd

MD5 4c0d43f1a31e76255cb592bb616683e7
SHA1 0a9f3d77a6e064baebacacc780701117f09169ad
SHA256 0f84e9f0d0bf44d10527a9816fcab495e3d797b09e7bbd1e6bd666ceb4b6c1a8
SHA512 b8176a180a441fe402e86f055aa5503356e7f49e984d70ab1060dee4f5f17fcec9c01f75bbff75ce5f4ef212677a6525804be53646cc0d7817b6ed5fd83fd778

C:\Users\Admin\AppData\Local\Temp\_MEI35602\select.pyd

MD5 6ae54d103866aad6f58e119d27552131
SHA1 bc53a92a7667fd922ce29e98dfcf5f08f798a3d2
SHA256 63b81af5d3576473c17ac929bea0add5bf8d7ea95c946caf66cbb9ad3f233a88
SHA512 ff23f3196a10892ea22b28ae929330c8b08ab64909937609b7af7bfb1623cd2f02a041fd9fab24e4bc1754276bdafd02d832c2f642c8ecdcb233f639bdf66dd0

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 e6b7681ccc718ddb69c48abe8709fdd6
SHA1 a518b705746b2c6276f56a2f1c996360b837d548
SHA256 4b532729988224fe5d98056cd94fc3e8b4ba496519f461ef5d9d0ff9d9402d4b
SHA512 89b20affaa23e674543f0f2e9b0a8b3ecd9a8a095e19d50e11c52cb205dafdbf2672892fd35b1c45f16e78ae9b61525de67dbe7673f8ca450aa8c42feeac0895

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-profile-l1-1-0.dll

MD5 654d95515ab099639f2739685cb35977
SHA1 9951854a5cf407051ce6cd44767bfd9bd5c4b0cc
SHA256 c4868e4cebdf86126377a45bd829d88449b4aa031c9b1c05edc47d6d395949d4
SHA512 9c9dd64a3ad1136ba62cca14fc27574faaebc3de1e371a86b83599260424a966dfd813991a5ef0b2342e0401cb99ce83cd82c19fcae73c7decdb92bac1fb58a8

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-processthreads-l1-1-1.dll

MD5 d6ad0f2652460f428c0e8fc40b6f6115
SHA1 1a5152871abc5cf3d4868a218de665105563775e
SHA256 4ef09fa6510eeebb4855b6f197b20a7a27b56368c63cc8a3d1014fa4231ab93a
SHA512 ceafeee932919bc002b111d6d67b7c249c85d30da35dfbcebd1f37db51e506ac161e4ee047ff8f7bf0d08da6a7f8b97e802224920bd058f8e790e6fa0ee48b22

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-processthreads-l1-1-0.dll

MD5 95612a8a419c61480b670d6767e72d09
SHA1 3b94d1745aff6aafeff87fed7f23e45473f9afc9
SHA256 6781071119d66757efa996317167904697216ad72d7c031af4337138a61258d4
SHA512 570f15c2c5aa599332dd4cfb3c90da0dd565ca9053ecf1c2c05316a7f623615dd153497e93b38df94971c8abf2e25bc1aaaf3311f1cda432f2670b32c767012a

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 1322690996cf4b2b7275a7950bad9856
SHA1 502e05ed81e3629ea3ed26ee84a4e7c07f663735
SHA256 5660030ee4c18b1610fb9f46e66f44d3fc1cf714ecce235525f08f627b3738d7
SHA512 7edc06bfa9e633351291b449b283659e5dd9e706dd57ade354bce3af55df4842491af27c7721b2acc6948078bdfc8e9736fec46e0641af368d419c7ed6aebd44

memory/2212-317-0x0000000006A00000-0x0000000007018000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 61f70f2d1e3f22e976053df5f3d8ecb7
SHA1 7d224b7f404cde960e6b7a1c449b41050c8e9c58
SHA256 2695761b010d22fdfda2b5e73cf0ac7328ccc62b4b28101d5c10155dd9a48020
SHA512 1ddc568590e9954db198f102be99eabb4133b49e9f3b464f2fc7f31cc77d06d5a7132152f4b331332c42f241562ee6c7bf1c2d68e546db3f59ab47eaf83a22cf

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-memory-l1-1-0.dll

MD5 623283471b12f1bdb83e25dbafaf9c16
SHA1 ecbba66f4dca89a3faa3e242e30aefac8de02153
SHA256 9ca500775fee9ff69b960d65040b8dc415a2efde2982a9251ee6a3e8de625bc7
SHA512 54b69ffa2c263be4ddadca62fa2867fea6148949d64c2634745db3dcbc1ba0ecf7167f02fa53efd69eaaee81d617d914f370f26ca16ee5850853f70c69e9a61f

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-localization-l1-2-0.dll

MD5 1d75e7b9f68c23a195d408cf02248119
SHA1 62179fc9a949d238bb221d7c2f71ba7c1680184c
SHA256 67ebe168b7019627d68064043680674f9782fda7e30258748b29412c2b3d4c6b
SHA512 c2ee84a9aeac34f7b51426d12f87bb35d8c3238bb26a6e14f412ea485e5bd3b8fb5b1231323d4b089cf69d8180a38ddd7fd593cc52cbdf250125ad02d66eea9d

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 569a7ac3f6824a04282ff708c629a6d2
SHA1 fc0d78de1075dfd4c1024a72074d09576d4d4181
SHA256 84c579a8263a87991ca1d3aee2845e1c262fb4b849606358062093d08afdc7a2
SHA512 e9cbff82e32540f9230cead9063acb1aceb7ccc9f3338c0b7ad10b0ac70ff5b47c15944d0dce33ea8405554aa9b75de30b26ae2ca55db159d45b6e64bc02a180

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-interlocked-l1-1-0.dll

MD5 1dccf27f2967601ce6666c8611317f03
SHA1 d8246df2ed9ec4a8a719fd4b1db4fd8a71ef679b
SHA256 6a83ab9a413afd74d77a090f52784b0128527bee9cb0a4224c59d5c75fc18387
SHA512 70b96d69d609211f8b9e05fa510ea7d574ae8da3a6498f5c982aee71635b8a749162247055b7ba21a884bfa06c1415b68912c463f0f1b6ffb9049f3532386877

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-heap-l1-1-0.dll

MD5 b071e761cea670d89d7ae80e016ce7e6
SHA1 c675be753dbef1624100f16674c2221a20cf07dd
SHA256 63fb84a49308b857804ae1481d2d53b00a88bbd806d257d196de2bd5c385701e
SHA512 f2ecbdaba3516d92bd29dcce618185f1755451d95c7dbbe23f8215318f6f300a9964c93ec3ed65c5535d87be82b668e1d3025a7e325af71a05f14e15d530d35f

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-handle-l1-1-0.dll

MD5 7bc1b8712e266db746914db48b27ef9c
SHA1 c76eb162c23865b3f1bd7978f7979d6ba09ccb60
SHA256 f82d05aea21bcf6337ef45fbdad6d647d17c043a67b44c7234f149f861a012b9
SHA512 db6983f5f9c18908266dbf01ef95ebae49f88edc04a0515699ef12201ac9a50f09939b8784c75ae513105ada5b155e5330bd42d70f8c8c48fe6005513aefad2a

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-file-l2-1-0.dll

MD5 7d4d4593b478b4357446c106b64e61f8
SHA1 8a4969c9e59d7a7485c8cc5723c037b20dea5c9d
SHA256 0a6e2224cde90a0d41926e8863f9956848ffbf19848e8855bd08953112afc801
SHA512 7bc9c473705ec98ba0c1da31c295937d97710cedefc660f6a5cb0512bae36ad23bebb2f6f14df7ce7f90ec3f817b02f577317fdd514560aab22cb0434d8e4e0b

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-file-l1-2-0.dll

MD5 f0c73f7454a5ce6fb8e3d795fdb0235d
SHA1 acdd6c5a359421d268b28ddf19d3bcb71f36c010
SHA256 2a59dd891533a028fae7a81e690e4c28c9074c2f327393fab17329affe53fd7b
SHA512 bd6cf4e37c3e7a1a3b36f42858af1b476f69caa4ba1fd836a7e32220e5eff7ccc811c903019560844af988a7c77cc41dc6216c0c949d8e04516a537da5821a3e

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-file-l1-1-0.dll

MD5 642b29701907e98e2aa7d36eba7d78b8
SHA1 16f46b0e057816f3592f9c0a6671111ea2f35114
SHA256 5d72feac789562d445d745a55a99536fa9302b0c27b8f493f025ba69ba31941c
SHA512 1beab2b368cc595beb39b2f5a2f52d334bc42bf674b8039d334c6d399c966aff0b15876105f0a4a54fa08e021cb44907ed47d31a0af9e789eb4102b82025cf57

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 8d6599d7c4897dcd0217070cca074574
SHA1 25eacaaa4c6f89945e97388796a8c85ba6fb01fb
SHA256 a011260fafaaaefd7e7326d8d5290c6a76d55e5af4e43ffa4de5fea9b08fa928
SHA512 e8e2e7c5bff41ccaa0f77c3cfee48dac43c11e75688f03b719cc1d716db047597a7a2ce25b561171ef259957bdcd9dd4345a0e0125db2b36f31698ba178e2248

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-debug-l1-1-0.dll

MD5 e1ca15cf0597c6743b3876af23a96960
SHA1 301231f7250431bd122b12ed34a8d4e8bb379457
SHA256 990e46d8f7c9574a558ebdfcb8739fbccba59d0d3a2193c9c8e66807387a276d
SHA512 7c9dacd882a0650bf2f553e9bc5647e6320a66021ac4c1adc802070fd53de4c6672a7bacfd397c51009a23b6762e85c8017895e9347a94d489d42c50fa0a1c42

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-datetime-l1-1-0.dll

MD5 5af784f599437629deea9fe4e8eb4799
SHA1 3c891b920fd2703edd6881117ea035ced5a619f6
SHA256 7e5bd3ee263d09c7998e0d5ffa684906ddc56da61536331c89c74b039df00c7c
SHA512 4df58513cf52511c0d2037cdc674115d8ed5a0ed4360eb6383cc6a798a7037f3f7f2d587797223ed7797ccd476f1c503b3c16e095843f43e6b87d55ad4822d70

C:\Users\Admin\AppData\Local\Temp\_MEI35602\api-ms-win-core-console-l1-1-0.dll

MD5 b56d69079d2001c1b2af272774b53a64
SHA1 67ede1c5a71412b11847f79f5a684eabaf00de01
SHA256 f3a41d882544202b2e1bdf3d955458be11fc7f76ba12668388a681870636f143
SHA512 7eb8fe111dd2e1f7e308b622461eb311c2b9fc4ef44c76e1def6c524eb7281d5522af12211f1f91f651f2b678592d2997fe4cd15724f700deaff314a1737b3a8

C:\Users\Admin\AppData\Local\Temp\_MEI35602\libffi-7.dll

MD5 4424baf6ed5340df85482fa82b857b03
SHA1 181b641bf21c810a486f855864cd4b8967c24c44
SHA256 8c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79
SHA512 8adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33

C:\Users\Admin\AppData\Local\Temp\_MEI35602\base_library.zip

MD5 f4981249047e4b7709801a388e2965af
SHA1 42847b581e714a407a0b73e5dab019b104ec9af2
SHA256 b191e669b1c715026d0732cbf8415f1ff5cfba5ed9d818444719d03e72d14233
SHA512 e8ef3fb3c9d5ef8ae9065838b124ba4920a3a1ba2d4174269cad05c1f318bc9ff80b1c6a6c0f3493e998f0587ef59be0305bc92e009e67b82836755470bc1b13

memory/2212-318-0x0000000005B00000-0x0000000005C0A000-memory.dmp

memory/2212-319-0x0000000005A20000-0x0000000005A32000-memory.dmp

memory/1964-320-0x00007FF7DE060000-0x00007FF7DE0AA000-memory.dmp

memory/2212-321-0x0000000005A80000-0x0000000005ABC000-memory.dmp

memory/2212-322-0x0000000005C10000-0x0000000005C5C000-memory.dmp

memory/3468-323-0x0000000008330000-0x0000000008383000-memory.dmp

memory/2212-324-0x0000000005D80000-0x0000000005DE6000-memory.dmp

memory/2212-326-0x0000000007370000-0x00000000073C0000-memory.dmp

memory/2212-327-0x0000000007590000-0x0000000007752000-memory.dmp

memory/2212-328-0x0000000007C90000-0x00000000081BC000-memory.dmp